web process in gdb. Access violation with EIP = 0x31323334
https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/304/326/836/230/004/original/07e7e7aa51897409.png
If we poke around with various sizes/contents of the buffer that we send, we can conclude that we can indeed control EIP. (Yes, EIP, since web is a 32-bit app 😂).
However, given that the address space of web has nothing that matches up with ASCII-based number/. addressing, I'm curious what these "sophisticated means" being used ITW are. Maybe something data-based? 🤔
Also LOL at Ivanti's:
it was evaluated and determined not to be exploitable
GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.
All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.