Skip to content

Contains an exploit code of a SEH attack against the file sharing wizard 1.5.0 application and a report explaining the process

Notifications You must be signed in to change notification settings

GihanJ/Structured-Exception-Handling-SEH-Buffer-Overflow

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Structured-Exception-Handling-SEH-Buffer-Overflow

Contains an exploit code of a SEH attack against the file sharing wizard 1.5.0 application and a report explaining the process

CVE-2019-16724

File Sharing Wizard 1.5.0 allows a remote attacker to obtain arbitrary code execution by exploiting a Structured Exception Handler (SEH) based buffer overflow in an HTTP POST parameter, a similar issue to CVE-2010-2330 and CVE-2010-2331.

SCORE = 9.8 (Critical)

Environment

Attack Machine - Kali Linux

Victim Machine - Windows 7

Vulnerable Application - File sharing wizard V 1.5.0

Note

Reverse shell is bound to a specific IP, inorder to succesfully run the code replace the localhost and generate a new shell

About

Contains an exploit code of a SEH attack against the file sharing wizard 1.5.0 application and a report explaining the process

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages