vendor:
ChaosPro
by:
@securitychops
7.5
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: ChaosPro
Affected Version From: 3.1
Affected Version To: 3.1
Patch Exists: NO
Related CWE:
CPE:
Platforms Tested: Windows
2019
ChaosPro 3.1
The exploit allows an attacker to execute arbitrary code by exploiting a buffer overflow vulnerability in ChaosPro 3.1. This can be achieved by sending a specially crafted payload to the vulnerable application. The payload adjusts the stack and then executes a shell reverse TCP connection to the attacker's specified IP and port. The exploit payload is generated using msfvenom and uses the x86/alpha_upper encoder to avoid bad characters. The exploit is specific to the Windows platform.
Mitigation:
The vendor has not released a patch for this vulnerability. To mitigate the risk, it is recommended to update to the latest version of ChaosPro or consider using an alternative software.