exploit the possibilities

MP3 Cutter 1.1.0 Registration Bypass

MP3 Cutter 1.1.0 Registration Bypass
Posted Sep 16, 2016
Authored by ZwX

MP3 Cutter version 1.1.0 suffers from a registration bypass flaw.

tags | exploit, bypass
MD5 | e43e94f41c8764f44c9fde802c9ea6fe

MP3 Cutter 1.1.0 Registration Bypass

Change Mirror Download
Document Title:
===============
MP3 Cutter 1.1.0 - Reverse Engineering Issue


Release Date:
=============
2016-09-05


Vulnerability Disclosure Timeline:
==================================
2016-09-15: Public Disclosure


Common Vulnerability Scoring System:
====================================
6


Product & Service Introduction:
===============================
MP3 Cutter is a Windows desktop utility allows you to cut and split a big MP3 or video to small audio pieces.
With MP3 Cutter, you can split and cut not only MP3 format, but also WMA, WAV, AMR, WMV, AVI, MPG, 3GP, MP4, FLAC,
OGG, WMV, MOV and more than 40 audio & video formats.

(Copy of the Vendor Homepage: http://www.mp3cutter.org/)


Affected Product(s):
====================
Product: MP3 Cutter v1.1.0


Exploitation Technique:
=======================
Local


Severity Level:
===============
High


Technical Details & Description:
================================
A Reverse Enginering Vulnerability has been discovered in the official MP3 Cutter v1.1.0 software.

An attacker could make the software completely free MP3 Cutter manipulating conditoinel jumps and bypass security registration code to back any password and validated registration.

Vulnerable Input(s):
[+] Registration Code


Proof of Concept (PoC):
=======================
A Reverse Enginering Vulnerability can be exploited by local attackers with low privileged system user account.
For security demonstration or to reproduce the vulnerability follow the provided information and steps below to continue.

Manual steps to reproduce the vulnerability ...
1. Debug MP3 Cutter.exe
2. Find the string "Invaild Serial Code"
3. Replace the conditional jump "JMP" in "JNZ"
4. Save the changes made and save the executable
5. Run the software you have changed
6. Click "Register MP3 Cutter now"
7. Enter any code in "Input Registration Code" eg 12345 and click "OK"
8. BOOMM Registration Hijacked.


Security Risk:
==============
The security risk of the reverse engineering vulnerability in the software core is estimated as high. (CVSS 6.0)

--- PoC : Exploit ---
0067C193 E9 5A010000 JMP MP3Cutte.0067C2F2 <-- Handle the conditional jump JMP to (JNZ MP3Cutte.0067C2F2)
0067C198 C745 FC 13000000 MOV DWORD PTR SS:[EBP-4],13
0067C19F C785 60FFFFFF 04>MOV DWORD PTR SS:[EBP-A0],80020004
0067C1A9 C785 58FFFFFF 0A>MOV DWORD PTR SS:[EBP-A8],0A
0067C1B3 C785 70FFFFFF 04>MOV DWORD PTR SS:[EBP-90],80020004
0067C1BD C785 68FFFFFF 0A>MOV DWORD PTR SS:[EBP-98],0A
0067C1C7 C785 40FFFFFF 38>MOV DWORD PTR SS:[EBP-C0],MP3Cutte.005BE>; UNICODE "Invaild"
0067C1D1 C785 38FFFFFF 08>MOV DWORD PTR SS:[EBP-C8],8
0067C1DB 8D95 38FFFFFF LEA EDX,DWORD PTR SS:[EBP-C8]
0067C1E1 8D8D 78FFFFFF LEA ECX,DWORD PTR SS:[EBP-88]
0067C1E7 E8 3271D8FF CALL <JMP.&MSVBVM60.__vbaVarDup>
0067C1EC C785 50FFFFFF 08>MOV DWORD PTR SS:[EBP-B0],MP3Cutte.005BE>; UNICODE "Invaild Serial Code."


[+] Disclaimer [+]
===================
Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given to the author.
The author is not responsible for any misuse of the information contained herein and prohibits any malicious use of all security related information or exploits by the author or elsewhere.


Domain: www.zwx.fr
Contact: msk4@live.fr
Social: twitter.com/XSSed.fr
Feeds: www.zwx.fr/feed/
Advisory: www.vulnerability-lab.com/show.php?user=ZwX


Copyright A(c) 2016 | ZwX - Security Researcher (Software & web application)

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

February 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    22 Files
  • 2
    Feb 2nd
    9 Files
  • 3
    Feb 3rd
    2 Files
  • 4
    Feb 4th
    15 Files
  • 5
    Feb 5th
    50 Files
  • 6
    Feb 6th
    24 Files
  • 7
    Feb 7th
    15 Files
  • 8
    Feb 8th
    6 Files
  • 9
    Feb 9th
    1 Files
  • 10
    Feb 10th
    1 Files
  • 11
    Feb 11th
    22 Files
  • 12
    Feb 12th
    25 Files
  • 13
    Feb 13th
    16 Files
  • 14
    Feb 14th
    32 Files
  • 15
    Feb 15th
    15 Files
  • 16
    Feb 16th
    10 Files
  • 17
    Feb 17th
    2 Files
  • 18
    Feb 18th
    27 Files
  • 19
    Feb 19th
    32 Files
  • 20
    Feb 20th
    7 Files
  • 21
    Feb 21st
    0 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close