# ProFTPD 1.3.3c 后门执行漏洞
## 概述
在2010年11月28日至12月2日期间分发的官方 ProFTPD 1.3.3c 源码压缩包中被植入了一个恶意后门。
## 影响版本
- ProFTPD 1.3.3c(在此期间下载的官方源码包)
## 细节
- 后门通过一个隐藏的FTP命令触发
- 触发后可使服务器以**root权限**执行任意**shell命令**
## 影响
- 允许**远程未认证攻击者**在FTP服务器主机上执行任意操作系统命令
- 可能导致**完全系统控制权**被窃取
                                        
                                    
                                | # | POC 描述 | 源链接 | 神龙链接 | 
|---|---|---|---|
| 1 | ProFTPD 1.3.3c contains a command injection backdoor caused by a hidden FTP command trigger in the source tarball, letting remote unauthenticated attackers execute arbitrary shell commands with root privileges. | https://github.com/projectdiscovery/nuclei-templates/blob/main/javascript/cves/CVE-2010-20103.yaml | POC详情 | 
| 2 | ProFTPD 1.3.3c contains a command injection backdoor caused by a hidden FTP command trigger in the source tarball, letting remote unauthenticated attackers execute arbitrary shell commands with root privileges. | https://github.com/projectdiscovery/nuclei-templates/blob/main/javascript/cves/2010/CVE-2010-20103.yaml | POC详情 | 
标题: ProFTPd 1.3.3c - Compromised Source Backdoor Remote Code Execution - Linux remote Exploit -- 🔗来源链接
标签: exploit
神龙速读标题: ProFTPd-1.3.3c - Backdoor Command Execution (Metasploit) - Linux remote Exploit -- 🔗来源链接
标签: exploit
神龙速读标题: ProFTPD 1.3.3c Backdoor Command Execution | Advisories | VulnCheck -- 🔗来源链接
标签: third-party-advisory
神龙速读暂无评论