kd❯ g

fffff803'00000000 EB FE jmp short loc_HackinG

~ ./priv



EFS Easy Chat Server - CVE-2019-20502

body2.ghp receives a variable called message, which allows a buffer to overflow to produce an application block

Description:
1- First socket with (GET) generates a valid session to then do step 2.
2- Second we send (POST) the data message in the variable to crashear the application



Video:
https://www.youtube.com/watch?v=BlOi_-OxOYc

Code: