Small presentation example of Remote Code Execution in SA:MP. This vulnerability is fixed in latest RC samp 0.3.7-R5
-
src/
is just small example of downloading samp037r5 file and run it with telegram logger-
Note: you already have build file in dir
release/
with namesampRCE.dll
with non longer working telegram token (which i used for testing)Lines 10 to 16 in 7ee3ef9
-
-
sRDI is external tool you can get it here: https://github.com/monoxgas/sRDI or via command:
git clone https://github.com/monoxgas/sRDI
-
-
py .\ConvertToShellcode.py .\sampRCE.asi
|----------| |---------| |--------|
| samp svr | ---> [rce.pwn] -> | payload | <---> [ scriptfiles/sampRCE.asi ] ----> | client |
|----------| |---------| |------- |
big thanks to EvgeN 1137 who explained and cover this vulnerability you can check his post here
This repository is for academic purposes, the use of this software is your responsibility.