Skip to content

Commit 0ea4153

Browse files
committed
automatic module_metadata_base.json update
1 parent 6d939c1 commit 0ea4153

File tree

1 file changed

+14
-10
lines changed

1 file changed

+14
-10
lines changed

db/modules_metadata_base.json

+14-10
Original file line numberDiff line numberDiff line change
@@ -123125,7 +123125,7 @@
123125123125
"needs_cleanup": null
123126123126
},
123127123127
"exploit_windows/ftp/sami_ftpd_user": {
123128-
"name": "KarjaSoft Sami FTP Server v2.02 USER Overflow",
123128+
"name": "KarjaSoft Sami FTP Server v2.0.2 USER Overflow",
123129123129
"fullname": "exploit/windows/ftp/sami_ftpd_user",
123130123130
"aliases": [
123131123131

@@ -123134,9 +123134,13 @@
123134123134
"disclosure_date": "2006-01-24",
123135123135
"type": "exploit",
123136123136
"author": [
123137-
"aushack <[email protected]>"
123137+
"Muhammad Ahmed Siddiqui",
123138+
"Critical Security",
123139+
"n30m1nd",
123140+
"aushack <[email protected]>",
123141+
"bcoles <[email protected]>"
123138123142
],
123139-
"description": "This module exploits the KarjaSoft Sami FTP Server version 2.02\n by sending an excessively long USER string. The stack is overwritten\n when the administrator attempts to view the FTP logs. Therefore, this exploit\n is passive and requires end-user interaction. Keep this in mind when selecting\n payloads. When the server is restarted, it will re-execute the exploit until\n the logfile is manually deleted via the file system.",
123143+
"description": "This module exploits an unauthenticated stack buffer overflow in\n KarjaSoft Sami FTP Server version 2.0.2 by sending an overly long\n USER string during login.\n\n The payload is triggered when the administrator opens the application\n GUI. If the GUI window is open at the time of exploitation, the\n payload will be executed immediately. Keep this in mind when selecting\n payloads. The application will crash following execution of the\n payload and will not restart automatically.\n\n When the application is restarted, it will re-execute the payload\n unless the payload has been manually removed from the SamiFTP.binlog\n log file.\n\n This module has been tested successfully on Sami FTP Server versions:\n 2.0.2 on Windows XP SP0 (x86);\n 2.0.2 on Windows 7 SP1 (x86);\n 2.0.2 on Windows 7 SP1 (x64); and\n 2.0.2 on Windows 10 (1909) (x64).",
123140123144
"references": [
123141123145
"CVE-2006-0441",
123142123146
"CVE-2006-2212",
@@ -123148,7 +123152,8 @@
123148123152
"EDB-1452",
123149123153
"EDB-1462",
123150123154
"EDB-3127",
123151-
"EDB-3140"
123155+
"EDB-3140",
123156+
"EDB-40675"
123152123157
],
123153123158
"platform": "Windows",
123154123159
"arch": "x86",
@@ -123160,20 +123165,19 @@
123160123165

123161123166
],
123162123167
"targets": [
123163-
"Automatic",
123164-
"Windows 2000 Pro All - English",
123165-
"Windows 2000 Pro All - Italian",
123166-
"Windows 2000 Pro All - French",
123167-
"Windows XP SP0/1 - English"
123168+
"Sami FTP Server version 2.0.2"
123168123169
],
123169-
"mod_time": "2020-10-02 17:38:06 +0000",
123170+
"mod_time": "2021-02-25 20:53:30 +0000",
123170123171
"path": "/modules/exploits/windows/ftp/sami_ftpd_user.rb",
123171123172
"is_install_path": true,
123172123173
"ref_name": "windows/ftp/sami_ftpd_user",
123173123174
"check": true,
123174123175
"post_auth": false,
123175123176
"default_credential": false,
123176123177
"notes": {
123178+
"Stability": [
123179+
"crash-service-down"
123180+
]
123177123181
},
123178123182
"needs_cleanup": null
123179123183
},

0 commit comments

Comments
 (0)