Path: blob/master/documentation/modules/auxiliary/scanner/ftp/bison_ftp_traversal.md
55892 views
Vulnerable Application
This module exploits a directory traversal vulnerability in BisonWare BisonFTP Server version 3.5. The flaw allows an attacker to download arbitrary files from the server by sending a crafted RETR command using traversal strings such as ..//.
The vulnerability is tracked as CVE-2015-7602.
Setup
Download BisonWare BisonFTP Server 3.5 from Exploit-DB (EDB-38341).
Install and run it on a Windows host.
Configure the FTP root directory and ensure the service is listening (default port 21).
Set up an anonymous login or create a user account with credentials.
Verification Steps
Start msfconsole
Do:
use auxiliary/scanner/ftp/bison_ftp_traversalDo:
set RHOSTS [target IP]Do:
runYou should see the requested file contents stored as loot.
Options
DEPTH
The number of traversal sequences (..//) to prepend to the file path. The default is 32. A high value is used because the exact depth of the FTP root can vary.
PATH
The path to the file to retrieve from the target, relative to the drive root. The default value is boot.ini. For example, to read the Windows hosts file, set this to windows/system32/drivers/etc/hosts.
FTPUSER
The FTP username to authenticate with. Default is anonymous.
FTPPASS
The FTP password to authenticate with. Default is [email protected].