0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
FLV To MP3 Converter 3.0.5 - Reverse Engineering ByPass Registartion Vulnerability
Technical Details & Description: ================================ A reverse enginering vulnerability has been discovered in the official FLV To MP3 Converter 3.0.5 software. An attacker could make the software completely free FLV To MP3 Converter manipulating conditoinel jumps and bypass security registration code to back any password and validated registration. Vulnerable Input(s): [+] Registration Code Proof of Concept (PoC): ======================= The reverse enginering vulnerability can be exploited by local attackers with low privileged system user account. For security demonstration or to reproduce the vulnerability follow the provided information and steps below to continue. Manual steps to reproduce the vulnerability ... 1. Debug FLV To MP3 Converter.exe 2. Find the string "Invaild Serial Code" 3. Replace the conditional jump "JMP" in "JNZ" 4. Save the changes made and save the executable 5. Run the software you have changed 6. Click "Register FLV To MP3 Converter now" 7. Enter any code in "Input Registration Code" eg VulnerabilityLabs and click "OK" 8. BOOMM Registration Hijacked. --- PoC: Exploit Code --- 005F24F9 . E9 B0000000 JMP FLVToMP3.005F25AE <-- Handle the conditional jump JMP to (JNZ FLVToMP3.005F25AE) 005F24FE > C745 FC 130000>MOV DWORD PTR SS:[EBP-4],13 005F2505 . C785 78FFFFFF >MOV DWORD PTR SS:[EBP-88],80020004 005F250F . C785 70FFFFFF >MOV DWORD PTR SS:[EBP-90],0A 005F2519 . C745 88 040002>MOV DWORD PTR SS:[EBP-78],80020004 005F2520 . C745 80 0A0000>MOV DWORD PTR SS:[EBP-80],0A 005F2527 . C785 58FFFFFF >MOV DWORD PTR SS:[EBP-A8],FLVToMP3.00554>; UNICODE "Invaild" 005F2531 . C785 50FFFFFF >MOV DWORD PTR SS:[EBP-B0],8 005F253B . 8D95 50FFFFFF LEA EDX,DWORD PTR SS:[EBP-B0] 005F2541 . 8D4D 90 LEA ECX,DWORD PTR SS:[EBP-70] 005F2544 . E8 3F0FE1FF CALL <JMP.&MSVBVM60.__vbaVarDup> 005F2549 . C785 68FFFFFF > MOV DWORD PTR SS:[EBP-98],FLVToMP3.00554>; UNICODE "Invaild Serial Code." [+] Disclaimer [+] =================== Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given to the author. The author is not responsible for any misuse of the information contained herein and prohibits any malicious use of all security related information or exploits by the author or elsewhere. Domain: www.zwx.fr Contact: msk4@live.fr Social: twitter.com/XSSed.fr Feeds: www.zwx.fr/feed/ Advisory: www.vulnerability-lab.com/show.php?user=ZwX packetstormsecurity.com/files/author/12026/ cxsecurity.com/search/author/DESC/AND/FIND/0/10/ZwX/ 0day.today/author/27461 # 0day.today [2024-11-15] #