Articles Blog | G5 Cyber Security

Research – ftp.conversions.txt

There exists a vulnerability with certain configurations of certain ftp daemons with which users with a valid ftp only acccount on a system may execute arbitrary commands (including binaries supplied by themselves). There also exists the possibilty that anonymous ftp users may execute arbitrar y commands (also including binaries supplied by themselves). While this vulnerability is entirely configuration dependent. The required configuration is rather common. Exploit information here.

 

You can download it from the following link: https://packetstormsecurity.com/files/download/11092/ftp.conversions.txt

Source: https://packetstormsecurity.com/files/11092/ftp.conversions.txt.html

Exit mobile version