# N/A
## 漏洞概述
vsftpd 2.3.4版本在2011年6月30日至7月3日之间下载的版本中包含一个后门,该后门会在6200/tcp端口上打开一个shell。
## 影响版本
- vsftpd 2.3.4
## 漏洞细节
在指定日期下载的vsftpd 2.3.4版本中包含一个后门。攻击者可以通过连接到6200/tcp端口来获取一个shell。
## 漏洞影响
此漏洞允许攻击者通过6200/tcp端口获取shell访问权限,可能导致未经授权的系统访问和控制。
是否为 Web 类漏洞: 是
判断理由:
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | An exploit to get root in vsftpd 2.3.4 (CVE-2011-2523) written in python | https://github.com/HerculesRD/vsftpd2.3.4PyExploit | POC详情 |
| 2 | vsftpd 2.3.4 Backdoor Exploit | https://github.com/nobodyatall648/CVE-2011-2523 | POC详情 |
| 3 | https://www.exploit-db.com/exploits/49757 | https://github.com/Gr4ykt/CVE-2011-2523 | POC详情 |
| 4 | Python exploit for vsftpd 2.3.4 - Backdoor Command Execution | https://github.com/padsalatushal/CVE-2011-2523 | POC详情 |
| 5 | FreePascal implementation of the vsFTPD 2.3.4 CVE-2011-2523 | https://github.com/MFernstrom/OffensivePascal-CVE-2011-2523 | POC详情 |
| 6 | Python exploit for CVE-2011-2523 (VSFTPD 2.3.4 Backdoor Command Execution) | https://github.com/0xSojalSec/-CVE-2011-2523 | POC详情 |
| 7 | Python exploit for CVE-2011-2523 (VSFTPD 2.3.4 Backdoor Command Execution) | https://github.com/0xSojalSec/CVE-2011-2523 | POC详情 |
| 8 | None | https://github.com/XiangSi-Howard/CTF---CVE-2011-2523 | POC详情 |
| 9 | CVE-2011-2523 exploit | https://github.com/0xFTW/CVE-2011-2523 | POC详情 |
| 10 | Python exploit for vsftpd 2.3.4 - Backdoor Command Execution | https://github.com/Lynk4/CVE-2011-2523 | POC详情 |
| 11 | Python exploit for vsftpd 2.3.4 - Backdoor Command Execution | https://github.com/vaishnavucv/CVE-2011-2523 | POC详情 |
| 12 | A tool that exploits the CVE-2011-2523 vulnerability. | https://github.com/chleba124/vsftpd-exploit | POC详情 |
| 13 | Python exploit for CVE-2011-2523 (VSFTPD 2.3.4 Backdoor Command Execution) | https://github.com/4m3rr0r/CVE-2011-2523-poc | POC详情 |
| 14 | CVE-2011-2523 exploit | https://github.com/cowsecurity/CVE-2011-2523 | POC详情 |
| 15 | None | https://github.com/Shubham-2k1/Exploit-CVE-2011-2523 | POC详情 |
| 16 | A basic script that exploits CVE-2011-2523 | https://github.com/Tenor-Z/SmileySploit | POC详情 |
| 17 | vsFTPd 2.3.4 Remote Code Execution (CVE-2011-2523) PoC | https://github.com/sug4r-wr41th/CVE-2011-2523 | POC详情 |
| 18 | POC para CVE-2011-2523 | https://github.com/Fatalitysec/vsftpd_2.3.4_Backdoor | POC详情 |
| 19 | A Simple Python Program that uses gets a Remote Root Shell on the Target Device by exploiting a Vulnerability (CVE-2011-2523) present in vsFTP 2.3.4 | https://github.com/Gill-Singh-A/vsFTP-2.3.4-Remote-Root-Shell-Exploit | POC详情 |
| 20 | This tool exploits a well-known backdoor vulnerability found in vsFTPd version 2.3.4 (CVE-2011-2523) | https://github.com/everythingBlackkk/vsFTPd-Backdoor-Exploit-CVE-2011-2523- | POC详情 |
| 21 | PoC CVE-2011-2523 | https://github.com/Uno13x/CVE-2011-2523-PoC | POC详情 |
| 22 | PoC CVE-2011-2523 | https://github.com/R4idB0Y/CVE-2011-2523-PoC | POC详情 |
| 23 | PoC CVE-2011-2523 | https://github.com/0xB0y426/CVE-2011-2523-PoC | POC详情 |
| 24 | VsFTPd 2.3.4 Backdoor Command Execution | https://github.com/NullBrunk/CVE-2011-2523 | POC详情 |
| 25 | CVE-2011-2523 vsftpd 2.3.4 exploit | https://github.com/Lychi3/vsftpd-backdoor | POC详情 |
| 26 | Vulnerability assessment and exploitation of vsftpd 2.3.4 (CVE-2011-2523) using Metasploit. Full report and proof of root access included. | https://github.com/vedpakhare/vsftpd-234-vuln-report | POC详情 |
| 27 | None | https://github.com/madanokr001/CVE-2011-2523 | POC详情 |
| 28 | VSFTPD v2.3.4 had a serious backdoor vulnerability allowing attackers to execute arbitrary commands on the server with root-level access. The backdoor was triggered by a specific string of characters in a user login request, which allowed attackers to execute any command they wanted. | https://github.com/projectdiscovery/nuclei-templates/blob/main/network/cves/2011/CVE-2011-2523.yaml | POC详情 |
| 29 | Laboratorio técnico de ciberseguridad donde se realiza reconocimiento de red con Nmap y explotación de la vulnerabilidad CVE-2011-2523 (vsftpd 2.3.4) mediante Metasploit Framework. Proyecto académico orientado a demostrar habilidades en análisis de vulnerabilidades, uso de herramientas de pentesting y reporte técnico. | https://github.com/JohanMV/explotacion-vsftpd-nmap_Laboratorio_1 | POC详情 |
| 30 | Exploit for CVE-2011-2523. | https://github.com/lghost256/vsftpd234-exploit | POC详情 |
| 31 | None | https://github.com/hklabCR/CVE-2011-2523 | POC详情 |
| 32 | Python exploit for vsftpd 2.3.4 - Backdoor Command Execution | https://github.com/krill-x7/CVE-2011-2523 | POC详情 |
| 33 | None | https://github.com/cybermads/CVE-2011-2523 | POC详情 |
| 34 | A classic Exploit updated for vsftpd backdoor 2.3.4 | https://github.com/As9xm/BrokenDoor-CVE-2011-2523- | POC详情 |
| 35 | Python exploit for vsftpd 2.3.4 - Backdoor Command Execution | https://github.com/BolivarJ/CVE-2011-2523 | POC详情 |
| 36 | A step-by-step walkthrough of exploiting the vsFTPd 2.3.4 backdoor vulnerability (CVE-2011-2523) in a controlled lab environment, demonstrating reconnaissance, exploitation with Metasploit, and establishing a reverse shell. | https://github.com/seerat-fatima21/vsftpd-exploit | POC详情 |
| 37 | his project demonstrates the exploitation of the vsFTPd 2.3.4 backdoor vulnerability (CVE-2011-2523) using Metasploitable 2 and Kali Linux with Metasploit. It includes reconnaissance, exploitation, and defensive measures, with a detailed report and lab setup for learning ethical hacking and security best practices. | https://github.com/hajisthabegum/Exploiting-vsFTPd-2.3.4-Backdoor-Vulnerability-Ethical-Hacking-Lab-with-Metasploitable-2-Metasploit | POC详情 |
| 38 | Explotacion de la version 2.3.4 de vsftpd automatizada | https://github.com/avivyap/CVE-2011-2523 | POC详情 |
| 39 | Comprehensive Penetration Testing report and exploit chain for Metasploitable 2 focusing on CVE-2011-2523. | https://github.com/KlyneZyro/Metasploitable2-VAPT-Report | POC详情 |
| 40 | Full-lifecycle penetration test of a legacy Linux environment (Metasploitable 2) emulated on Apple Silicon. Demonstrating network reconnaissance, RCE via service backdoors (CVE-2011-2523), and cryptographic credential recovery. | https://github.com/Mirza-22144/Vulnerability-Assessment-Exploitation-Lab | POC详情 |
标题: Packet Storm -- 🔗来源链接
标签:x_refsource_MISC
神龙速读:
从提供的网页截图来看,这实际上是一个服务条款页面,而不是直接提供漏洞信息的页面。不过,我们可以通过分析其中的几个关键点,来推断出一些可能与网络安全和漏洞相关的信息:
- **关键信息源**:这类页面本身虽然不直接提供漏洞详情,但其内容可以揭示网站对安全性和用户行为的重视程度。例如,“Prohibited Activities”部分明确禁止了“Act maliciously against the Site or its users”,这表示网站意在防止恶意行为,这种行为往往与利用已知或未知的漏洞有关。
- **用户行为规范**:该页面详细规定了用户在使用网站时需遵守的行为规范,例如禁止通过自动化手段(如bot)访问网站(“You will not access the Site through automated or non-human means”)。这种规定暗示了对自动化攻击和爬虫工具的警惕,而这些工具有时会被黑客用来探测网站的漏洞。
- **免责声明和责任限制**:在“Disclaimer”和“Limitations of Liability”部分,网站表明不对因使用其服务而导致的任何损害负责,包括由安全漏洞引起的问题。这在一定程度上反映了网络环境的复杂性和不确定性。
综上,虽然这张截图并未直接给出漏洞的具体信息,但通过其对用户行为的规范以及在法律责任方面的声明,我们可以间接地了解到网站在面对安全威胁时的立场和应对策略。
Zaproxy alias impedit expedita quisquam pariatur exercitationem. Nemo rerum eveniet dolores rem quia dignissimos.