Skip to content

Commit 78b4233

Browse files
committed
Final changes
1 parent bae5442 commit 78b4233

File tree

1 file changed

+6
-5
lines changed

1 file changed

+6
-5
lines changed

modules/exploits/windows/ftp/freefloatftp_wbem.rb

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -20,9 +20,11 @@ def initialize(info={})
2020
super(update_info(info,
2121
'Name' => "FreeFloat FTP Server Arbitrary File Upload",
2222
'Description' => %q{
23-
This module abuses a lack of authentication and authorization on FreeFloat FTP
24-
Server to upload arbitrary files to the remote filesystem. This module uses the
25-
Windows Management Instrumentation service to execute the payload uploaded.
23+
This module abuses multiple issues in FreeFloat: 1. No credential is actually
24+
needed to login; 2. User's default path is in C:\, and this cannot be changed;
25+
3. User can write to anywhere on the server's file system. As a result of these
26+
poor implementations, a malicious user can just log in and then upload files,
27+
and let WMI (Management Instrumentation service) to execute the payload uploaded.
2628
},
2729
'License' => MSF_LICENSE,
2830
'Author' =>
@@ -37,7 +39,7 @@ def initialize(info={})
3739
'Platform' => 'win',
3840
'Targets' =>
3941
[
40-
['FreeFloat', {}],
42+
['FreeFloat', {}]
4143
],
4244
'Privileged' => true,
4345
'DisclosureDate' => "Dec 7 2012",
@@ -58,7 +60,6 @@ def check
5860
disconnect
5961

6062
if banner =~ /FreeFloat/
61-
# Yup, you're f*cked
6263
return Exploit::CheckCode::Vulnerable
6364
else
6465
return Exploit::CheckCode::Safe

0 commit comments

Comments
 (0)