vendor:
VSAXESS
by:
Diego Santamaria
6.5
CVSS
MEDIUM
Denial of Service (DoS) Local
400
CWE
Product Name: VSAXESS
Affected Version From: V2.6.2.70 build20171226_053
Affected Version To: V2.6.2.70 build20171226_053
Patch Exists: NO
Related CWE: N/A
CPE: a:visionistech:vsaxess:2.6.2.70_build20171226_053
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Windows 7 Professional
2018
VSAXESS V2.6.2.70 build20171226_053 – ‘organization’ Denial of Service (PoC)
VSAXESS V2.6.2.70 build20171226_053 is vulnerable to a denial of service attack when a malicious user sends a large amount of data to the 'Organization' field. This can be exploited by running the python code organization.py, opening organization_exploit.txt and copying the content, opening VSAXESS.exe, registering a password and username, choosing 'Control Panel', choosing 'Access Control', choosing 'Add', and pasting the content from organization_exploit.txt on 'Organization' which will cause the application to crash.
Mitigation:
Input validation should be used to prevent malicious users from sending large amounts of data to the 'Organization' field.