QuickShare File Server 1.2.1 Directory Traversal Vulnerability
This module exploits a vulnerability found in QuickShare File Server's FTP service. By supplying "../" in the file path, it is possible to trigger a directory traversal flaw, allowing the attacker to read a file outside the virtual directory. By default, the "Writable" option is enabled during account creation, therefore this makes it possible to create a file at an arbitrary location, which leads to remote code execution.
- sinn3r <sinn3r [at] metasploit.com>
- QuickShare File Server 1.2.1
To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':
msf > use exploit/windows/ftp/quickshare_traversal_write msf exploit(quickshare_traversal_write) > show targets ...targets... msf exploit(quickshare_traversal_write) > set TARGET <target-id> msf exploit(quickshare_traversal_write) > show options ...show and set options... msf exploit(quickshare_traversal_write) > exploit