Rapid7 Vulnerability & Exploit Database

EasyFTP Server CWD Command Stack Buffer Overflow

Back to Search

EasyFTP Server CWD Command Stack Buffer Overflow



This module exploits a stack-based buffer overflow in EasyFTP Server and earlier. EasyFTP fails to check input size when parsing 'CWD' commands, which leads to a stack based buffer overflow. EasyFTP allows anonymous access by default; valid credentials are typically unnecessary to exploit this vulnerability. After version, this package was renamed "UplusFtp". This exploit utilizes a small piece of code that I\'ve referred to as 'fixRet'. This code allows us to inject of payload of ~500 bytes into a 264 byte buffer by 'fixing' the return address post-exploitation. See references for more information.


  • Paul Makowski <my.hndl@gmail.com>
  • jduck <jduck@metasploit.com>




Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/windows/ftp/easyftp_cwd_fixret
msf exploit(easyftp_cwd_fixret) > show targets
msf exploit(easyftp_cwd_fixret) > set TARGET < target-id >
msf exploit(easyftp_cwd_fixret) > show options
    ...show and set options...
msf exploit(easyftp_cwd_fixret) > exploit

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security