-
Notifications
You must be signed in to change notification settings - Fork 14.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Easy Chat Server 2 to 3.1 - Buffer overflow (SEH) exploit #8586
Conversation
Rank = NormalRanking | ||
|
||
include Msf::Exploit::Remote::Tcp | ||
#include Msf::Exploit::Remote::HttpClient |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Why?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I used the Msf::Exploit::Remote::Tcp with direct socket connection, because with the HttpClient somehow the payload opcodes got a wrong encoding. Would it be better to change the implementation to use send_request_cgi with var_post?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
You should use the HTTP mixin if possible so you can get all the evasions and stuff.
Verified against my XP SP3 x86 VM:
Thanks for the submission, @Mzack9999! |
Release NotesThe exploits/windows/http/easychatserver_seh module has been added to the framework. This new module exploits vulnerable versions of Easy Chat Server, a Windows web-based chat application, to gain remote code execution. |
'ENCODER' => 'x86/alpha_mixed' | ||
}, | ||
'DisclosureDate' => 'Oct 09 2017', | ||
'DefaultTarget' => 0)) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think you want to register TARGETURI
.
sploit << rand_text_alpha_upper(200) | ||
|
||
res = send_request_cgi({ | ||
'uri' => normalize_uri(URI,'registresult.htm'), |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This should be target_uri.path
instead of URI
...
'submit1' => 'Register' | ||
} | ||
}) | ||
handler |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is redundant.
This module exploits a buffer overflow vulnerability of Easy Chat Server. Versions from 2 to 3.1 seem to be affected.
Verification
Tested on: Windows XP Sp3 English
Vulnerable application: http://echatserver.com/ecssetup.exe
Example output: