File tree Expand file tree Collapse file tree 2 files changed +10
-9
lines changed
documentation/modules/exploit/multi/http
modules/exploits/multi/http Expand file tree Collapse file tree 2 files changed +10
-9
lines changed Original file line number Diff line number Diff line change 11## Vulnerable Application
22
3- This Metasploit module exploits an unauthenticated Remote Code Execution vulnerability in ** Wing FTP Server** (Linux 64-bit),
4- specifically within its web administration interface.
5- The vulnerability exists due to insufficient input validation in the file upload endpoint,
6- where an attacker can upload a crafted script and trigger its execution.
7-
8- To set up a vulnerable environment, use the following ** Vagrantfile** which provisions a
9- Debian “bookworm” VM with Wing FTP Server installed and listening on standard ports:
3+ This Metasploit module exploits an ** unauthenticated Remote Code Execution** vulnerability
4+ in ** Wing FTP Server** (≤ 7.4.3 on Linux 64-bit), via its web administration interface.
5+ The flaw lies in the login handler (` loginok.html ` ): by injecting a null byte (` %00 ` ) into
6+ the ` username ` parameter, attacker-supplied Lua code is written into the session file and
7+ then executed by ` loadfile() ` , yielding arbitrary code execution as ** root** .
8+
9+ To set up a vulnerable lab, use the following ** Vagrantfile** , which provisions a Debian
10+ "bookworm" VM, installs Wing FTP Server 7.4.3, and exposes its HTTP/S and FTP ports on the host:
1011
1112``` ruby
1213Vagrant .configure(" 2" ) do |config |
Original file line number Diff line number Diff line change @@ -48,8 +48,8 @@ def initialize(info = {})
4848 ]
4949 ] ,
5050 'DefaultTarget' => 0 ,
51- 'Privileged' => false ,
52- 'DisclosureDate' => '2024 -06-30' ,
51+ 'Privileged' => true ,
52+ 'DisclosureDate' => '2025 -06-30' ,
5353 'Notes' => {
5454 'Stability' => [ CRASH_SAFE ] ,
5555 'Reliability' => [ REPEATABLE_SESSION ] ,
You can’t perform that action at this time.
0 commit comments