RCE via Buffer Overflow - AceaXeFTP [CVE-2019-19782]
It’s Possible to trigger a buffer overflow, in AceaXeFTP client, by hosting a malicious ftp server and sending malicious responses to the client.
Bin info:
Name: AceaXe + Homepage: http://www.labf.com/aceaxeplus/index.html
Proof of Concept (PoC):
Studying to take the OSCE exam, i was simply fascinated by the Exploit dev topic, ASLR Bypass and SEH based exploits, was something that i needed to see in the internet jungle.
Doing the exercises, i was able to successfuly exploit one of the examples. So, i thought “Yeah, it’s time to find a really old software that i could run in a windows vista and try to find some AAAA shenanigans”, and that’s what i did, got first a windows xp and windows vista vm running and the AceaXe software bundle installed.
At first, as i was really confortable with the basics of exploit dev, because of the OSCP background, i tried finding something in the windows xp, as it would not have ASLR nor DEP, so it would be easy to exploit.
As i was researching i found a lot of PoCs of ftp clients that got exploited by sending the response of the ftp commands with the exploit code. so, after some hours of trying a lot of gui overflows and file sizes oveflows, I finnally tried creating my own fake FTP server in python and sending the famous EHLO response with a giant string &afterwords, and it worked, EIP was finnaly overwritten by the AAAAs !
Finnally ! Time to exploit (winXP version):
The concept was easy. Create a simple socket listening to port 21, that sends the string after the client connects to it.
So, after Creating a FTP server I was able to send the malicious Buffer, to exploit this vulnerability. and after doing all the steps needed to create the simple buffer overflow i was able to retrieve a Command shell on the machine By sending the following payload, i was able to take control of the EIP
So, nothing new there, just a classic default buffer overflow, but i was so happy that i have found it haha. It was time to exploit it in windows vista, to smack some windows ASLRs. I exploited it using a SEH based Buffer overflow, and by using the egghunter technique. the Code used to exploit it was:
The vulnerability is, by this time (dez/2019), working. I tried contact with the vendor, but didn`t received any response. And there are several other vulnerabilities to exploit in this software, so if you guys want some study material. this one is recommended.
#CVE
CVE-2019-19782
Last updated