# N/A
## 漏洞概述
vsftpd 2.3.4版本在2011年6月30日至7月3日之间下载的版本中包含一个后门,该后门会在6200/tcp端口上打开一个shell。
## 影响版本
- vsftpd 2.3.4
## 漏洞细节
在指定日期下载的vsftpd 2.3.4版本中包含一个后门。攻击者可以通过连接到6200/tcp端口来获取一个shell。
## 漏洞影响
此漏洞允许攻击者通过6200/tcp端口获取shell访问权限,可能导致未经授权的系统访问和控制。
是否为 Web 类漏洞: 未知
判断理由:
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | An exploit to get root in vsftpd 2.3.4 (CVE-2011-2523) written in python | https://github.com/HerculesRD/vsftpd2.3.4PyExploit | POC详情 |
| 2 | vsftpd 2.3.4 Backdoor Exploit | https://github.com/nobodyatall648/CVE-2011-2523 | POC详情 |
| 3 | https://www.exploit-db.com/exploits/49757 | https://github.com/Gr4ykt/CVE-2011-2523 | POC详情 |
| 4 | Python exploit for vsftpd 2.3.4 - Backdoor Command Execution | https://github.com/padsalatushal/CVE-2011-2523 | POC详情 |
| 5 | FreePascal implementation of the vsFTPD 2.3.4 CVE-2011-2523 | https://github.com/MFernstrom/OffensivePascal-CVE-2011-2523 | POC详情 |
| 6 | Python exploit for CVE-2011-2523 (VSFTPD 2.3.4 Backdoor Command Execution) | https://github.com/0xSojalSec/-CVE-2011-2523 | POC详情 |
| 7 | Python exploit for CVE-2011-2523 (VSFTPD 2.3.4 Backdoor Command Execution) | https://github.com/0xSojalSec/CVE-2011-2523 | POC详情 |
| 8 | None | https://github.com/XiangSi-Howard/CTF---CVE-2011-2523 | POC详情 |
| 9 | CVE-2011-2523 exploit | https://github.com/0xFTW/CVE-2011-2523 | POC详情 |
| 10 | Python exploit for vsftpd 2.3.4 - Backdoor Command Execution | https://github.com/Lynk4/CVE-2011-2523 | POC详情 |
| 11 | Python exploit for vsftpd 2.3.4 - Backdoor Command Execution | https://github.com/vaishnavucv/CVE-2011-2523 | POC详情 |
| 12 | A tool that exploits the CVE-2011-2523 vulnerability. | https://github.com/chleba124/vsftpd-exploit | POC详情 |
| 13 | Python exploit for CVE-2011-2523 (VSFTPD 2.3.4 Backdoor Command Execution) | https://github.com/4m3rr0r/CVE-2011-2523-poc | POC详情 |
| 14 | CVE-2011-2523 exploit | https://github.com/cowsecurity/CVE-2011-2523 | POC详情 |
| 15 | None | https://github.com/Shubham-2k1/Exploit-CVE-2011-2523 | POC详情 |
| 16 | A basic script that exploits CVE-2011-2523 | https://github.com/Tenor-Z/SmileySploit | POC详情 |
| 17 | vsFTPd 2.3.4 Remote Code Execution (CVE-2011-2523) PoC | https://github.com/sug4r-wr41th/CVE-2011-2523 | POC详情 |
| 18 | POC para CVE-2011-2523 | https://github.com/Fatalitysec/vsftpd_2.3.4_Backdoor | POC详情 |
| 19 | A Simple Python Program that uses gets a Remote Root Shell on the Target Device by exploiting a Vulnerability (CVE-2011-2523) present in vsFTP 2.3.4 | https://github.com/Gill-Singh-A/vsFTP-2.3.4-Remote-Root-Shell-Exploit | POC详情 |
| 20 | This tool exploits a well-known backdoor vulnerability found in vsFTPd version 2.3.4 (CVE-2011-2523) | https://github.com/everythingBlackkk/vsFTPd-Backdoor-Exploit-CVE-2011-2523- | POC详情 |
| 21 | PoC CVE-2011-2523 | https://github.com/Uno13x/CVE-2011-2523-PoC | POC详情 |
| 22 | PoC CVE-2011-2523 | https://github.com/R4idB0Y/CVE-2011-2523-PoC | POC详情 |
| 23 | PoC CVE-2011-2523 | https://github.com/0xB0y426/CVE-2011-2523-PoC | POC详情 |
| 24 | VsFTPd 2.3.4 Backdoor Command Execution | https://github.com/NullBrunk/CVE-2011-2523 | POC详情 |
| 25 | CVE-2011-2523 vsftpd 2.3.4 exploit | https://github.com/Lychi3/vsftpd-backdoor | POC详情 |
| 26 | Vulnerability assessment and exploitation of vsftpd 2.3.4 (CVE-2011-2523) using Metasploit. Full report and proof of root access included. | https://github.com/vedpakhare/vsftpd-234-vuln-report | POC详情 |
| 27 | None | https://github.com/madanokr001/CVE-2011-2523 | POC详情 |
| 28 | VSFTPD v2.3.4 had a serious backdoor vulnerability allowing attackers to execute arbitrary commands on the server with root-level access. The backdoor was triggered by a specific string of characters in a user login request, which allowed attackers to execute any command they wanted. | https://github.com/projectdiscovery/nuclei-templates/blob/main/network/cves/2011/CVE-2011-2523.yaml | POC详情 |
| 29 | Laboratorio técnico de ciberseguridad donde se realiza reconocimiento de red con Nmap y explotación de la vulnerabilidad CVE-2011-2523 (vsftpd 2.3.4) mediante Metasploit Framework. Proyecto académico orientado a demostrar habilidades en análisis de vulnerabilidades, uso de herramientas de pentesting y reporte técnico. | https://github.com/JohanMV/explotacion-vsftpd-nmap_Laboratorio_1 | POC详情 |
| 30 | Exploit for CVE-2011-2523. | https://github.com/lghost256/vsftpd234-exploit | POC详情 |
| 31 | None | https://github.com/hklabCR/CVE-2011-2523 | POC详情 |
| 32 | Python exploit for vsftpd 2.3.4 - Backdoor Command Execution | https://github.com/krill-x7/CVE-2011-2523 | POC详情 |
| 33 | None | https://github.com/cybermads/CVE-2011-2523 | POC详情 |
| 34 | A classic Exploit updated for vsftpd backdoor 2.3.4 | https://github.com/As9xm/BrokenDoor-CVE-2011-2523- | POC详情 |
| 35 | Python exploit for vsftpd 2.3.4 - Backdoor Command Execution | https://github.com/BolivarJ/CVE-2011-2523 | POC详情 |
| 36 | A step-by-step walkthrough of exploiting the vsFTPd 2.3.4 backdoor vulnerability (CVE-2011-2523) in a controlled lab environment, demonstrating reconnaissance, exploitation with Metasploit, and establishing a reverse shell. | https://github.com/seerat-fatima21/vsftpd-exploit | POC详情 |
| 37 | his project demonstrates the exploitation of the vsFTPd 2.3.4 backdoor vulnerability (CVE-2011-2523) using Metasploitable 2 and Kali Linux with Metasploit. It includes reconnaissance, exploitation, and defensive measures, with a detailed report and lab setup for learning ethical hacking and security best practices. | https://github.com/hajisthabegum/Exploiting-vsFTPd-2.3.4-Backdoor-Vulnerability-Ethical-Hacking-Lab-with-Metasploitable-2-Metasploit | POC详情 |
标题: Packet Storm -- 🔗来源链接
标签: x_refsource_MISC
暂无评论