Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Path: blob/master/documentation/modules/exploit/windows/http/easyfilesharing_post.md
Views: 11789
Description
This module exploits a vulnerability in the Easy File Sharing Web Server application. It uses an overflow in the Email Post parameter, bypassing DEP via a ROP chain.
This module allows a remote attacker to execute a payload under the context of the user running the Easy File Sharing application
Vulnerable Application
Easy File Sharing is a file sharing software that allows visitors to upload/download files easily through a Web Browser (IE, Firefox, Chrome etc.).
This module has been tested successfully on
Easy File Sharing 7.2 on Windows XP En Sp3
Installers:
Verification Steps
Start
msfconsole
Do:
use exploits/windows/http/easyfilesharing_post
Do:
set rhosts [IP]
Do:
exploit
You should get your payload executed