Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Appearance settings

Contains an exploit code of a SEH attack against the file sharing wizard 1.5.0 application and a report explaining the process

Notifications You must be signed in to change notification settings

GihanJ/Structured-Exception-Handling-SEH-Buffer-Overflow

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Structured-Exception-Handling-SEH-Buffer-Overflow

Contains an exploit code of a SEH attack against the file sharing wizard 1.5.0 application and a report explaining the process

CVE-2019-16724

File Sharing Wizard 1.5.0 allows a remote attacker to obtain arbitrary code execution by exploiting a Structured Exception Handler (SEH) based buffer overflow in an HTTP POST parameter, a similar issue to CVE-2010-2330 and CVE-2010-2331.

SCORE = 9.8 (Critical)

Environment

Attack Machine - Kali Linux

Victim Machine - Windows 7

Vulnerable Application - File sharing wizard V 1.5.0

Note

Reverse shell is bound to a specific IP, inorder to succesfully run the code replace the localhost and generate a new shell

About

Contains an exploit code of a SEH attack against the file sharing wizard 1.5.0 application and a report explaining the process

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

Morty Proxy This is a proxified and sanitized view of the page, visit original site.