vendor:
Trillian
by:
Jose Miguel Gonzalez
7.8
CVSS
HIGH
Denial of Service
N/A
CWE
Product Name: Trillian
Affected Version From: 6.1 Build 16
Affected Version To: 6.1 Build 16
Patch Exists: NO
Related CWE: N/A
CPE: a:cerulean_studios:trillian:6.1
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Windows 10 Single Language x64
2018
Trillian 6.1 Build 16 – ‘Sign In’ Denial of Service (PoC)
A denial of service vulnerability exists in Trillian 6.1 Build 16 when a maliciously crafted username is used in the 'Sign In' process. An attacker can exploit this vulnerability by running the python code 'trillian.py', copying the context of 'trillian.txt' to the clipboard, pasting the clipboard on the 'Username' field, entering '1234' on the 'Password' field, and then clicking 'Sign In'. This will cause the application to crash.
Mitigation:
N/A