File tree Expand file tree Collapse file tree 1 file changed +6
-5
lines changed
modules/exploits/windows/ftp Expand file tree Collapse file tree 1 file changed +6
-5
lines changed Original file line number Diff line number Diff line change @@ -20,9 +20,11 @@ def initialize(info={})
20
20
super ( update_info ( info ,
21
21
'Name' => "FreeFloat FTP Server Arbitrary File Upload" ,
22
22
'Description' => %q{
23
- This module abuses a lack of authentication and authorization on FreeFloat FTP
24
- Server to upload arbitrary files to the remote filesystem. This module uses the
25
- Windows Management Instrumentation service to execute the payload uploaded.
23
+ This module abuses multiple issues in FreeFloat: 1. No credential is actually
24
+ needed to login; 2. User's default path is in C:\, and this cannot be changed;
25
+ 3. User can write to anywhere on the server's file system. As a result of these
26
+ poor implementations, a malicious user can just log in and then upload files,
27
+ and let WMI (Management Instrumentation service) to execute the payload uploaded.
26
28
} ,
27
29
'License' => MSF_LICENSE ,
28
30
'Author' =>
@@ -37,7 +39,7 @@ def initialize(info={})
37
39
'Platform' => 'win' ,
38
40
'Targets' =>
39
41
[
40
- [ 'FreeFloat' , { } ] ,
42
+ [ 'FreeFloat' , { } ]
41
43
] ,
42
44
'Privileged' => true ,
43
45
'DisclosureDate' => "Dec 7 2012" ,
@@ -58,7 +60,6 @@ def check
58
60
disconnect
59
61
60
62
if banner =~ /FreeFloat/
61
- # Yup, you're f*cked
62
63
return Exploit ::CheckCode ::Vulnerable
63
64
else
64
65
return Exploit ::CheckCode ::Safe
You can’t perform that action at this time.
0 commit comments