This repository contains a proof-of-concept (PoC) for exploiting CVE-2024-37742, a vulnerability in Safe Exam Browser (SEB) ≤ 3.5.0 on Windows. The vulnerability allows an attacker to share clipboard data between the SEB kiosk mode and the underlying system, compromising exam integrity. By exploiting this flaw, an attacker can bypass exam controls and gain an unfair advantage during exams.
This repository is for educational purposes only. The information provided here is intended to help developers understand the vulnerability and protect their systems. Do not use this exploit maliciously or without permission. Use of this PoC is at your own risk. The author is not responsible for any damages or legal issues that may arise from the use of this information.
SEB ≤ 3.5.0 (Windows)
- Incorrect access control allows clipboard data sharing between SEB kiosk and the underlying system.
- The exploit utilizes the pyperclip Python module to copy answers from a JSON file in the 'Answer-Key' directory, containing questions and answers.
- In SEB kiosk mode:
The user copies the question.
The wmi Python module monitors system charge and discharge states to signal a Python script.
The script accesses clipboard data, searches the JSON file for the answer, and pastes it into the clipboard. - Finally, the user pastes the answer from the clipboard into the answer field.
This vulnerability allows authorized users to compromise the integrity of exams conducted using Safe Exam Browser (SEB). By exploiting incorrect access control, users can share clipboard data between the SEB kiosk mode and the underlying system. This enables them to copy exam questions, retrieve answers from an external source, and paste them back into the exam, undermining the security and fairness of the examination process.
1. Upgrade to Safe Exam Browser (SEB) ≥ 3.6.0 for Windows, in the new version SEB has implemented an isolated clipboard
[https://safeexambrowser.org/windows/win_usermanual_en.html]
[https://safeexambrowser.org/windows/win_release_notes_en.html]
This code is available under the MIT License. See the LICENSE file for details.