![]() ![]() For authenticated users, this console can be exploited to obtain a reverse shell using the os.execute() function, which is native to LUA. Wing FTP Server console is written in LUA language. This hash password can easily convert into plain text using an online decrypter. This file can be found in the C:\Program Files\Wing FTP Server\Data\_ADMINISTRATOR location. Admin Credentials on HTTP Request:When an admin logs in to the Wing FTP Server, the credentials are sent in plain text.Ī file named admins.xml contains the username and MD5 hashed password.Exploit for Incorrect Permission Assignment for Critical Resource in Wftpserver Wing Ftp Server T01:53:45 Description Whats this Wing FTP Server 6.2. Whats this Wing FTP Server 6.2.5 - Privilege Escalation. ![]() On Shodan, we observed more than 150 devices that are publicly available on the internet, which may be vulnerable.įollowing vulnerabilities found in Wing FTP server: Whats this Wing FTP Server 6.2.5 - Privilege Escalation. This vulnerability allows authenticated remote attackers to execute arbitrary commands on the targeted server. Recently, an authenticated RCE vulnerability was found in the Wing FTP Server. ![]()
0 Comments
Leave a Reply. |