Senkas Kolibri WebServer version 20 is vulnerable to remote code execution via an overly long POST request Sending the exploit will result in a SEH overwrite, which can then be use to redirect execution to a POP POP RET within the application's binary itself, which once executed, will allow the attacker to execute his/her payload located in the H ...
#!/usr/bin/python
# Exploit Title : Kolibri WebServer 20 Get Request SEH Exploit
# Exploit Author : Revin Hadi S
# Date : 14/07/2014
# Vendor : wwwsenkascom
# Version : 20
# Tested on : Windows XP SP2 Eng, Windows Server 2003 Eng, Win 7 SP1 Eng
import socket, sys
help = """Kolibri WebServer 20 Get Request SEH Exploit
Target
[1] ...
#!/usr/bin/python
# Exploit Title: Kolibri GET request Stack buffer Overflow
# Date: 25 April 2014
# Exploit Author: Christian (Polunchis) Ramirez intrusionlabsorg
# Vendor Homepage: wwwsenkascom/kolibri/downloadphp
# Version: Kolibri 20
# Tested on: Windows XP SP3, Spanish
# Thanks:To my wife for putting up with my possessi ...