Vulnerability & Exploit Database

Back to search

QuickShare File Server 1.2.1 Directory Traversal Vulnerability

This module exploits a vulnerability found in QuickShare File Server's FTP service. By supplying "../" in the file path, it is possible to trigger a directory traversal flaw, allowing the attacker to read a file outside the virtual directory. By default, the "Writable" option is enabled during account creation, therefore this makes it possible to create a file at an arbitrary location, which leads to remote code execution.

Free Metasploit Download

Get your copy of the world's leading penetration testing tool

 Download Now

Module Name

exploit/windows/ftp/quickshare_traversal_write

Authors

  • modpr0be
  • sinn3r <sinn3r [at] metasploit.com>

References

Targets

  • QuickShare File Server 1.2.1

Platforms

  • windows

Reliability

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/windows/ftp/quickshare_traversal_write msf exploit(quickshare_traversal_write) > show targets ...targets... msf exploit(quickshare_traversal_write) > set TARGET <target-id> msf exploit(quickshare_traversal_write) > show options ...show and set options... msf exploit(quickshare_traversal_write) > exploit