Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2015-3306
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The mod_copy module in ProFTPD 1.3.5 allows remote attackers to read and write to arbitrary files via the site cpfr and site cpto commands.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
ProFTPD mod_copy模块信息泄露漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
ProFTPD是ProFTPD团队的一套开源的FTP服务器软件。该软件具有可配置性强、安全、稳定等特点。 ProFTPD 1.3.5版本的mod_copy模块中存在安全漏洞。远程攻击者可借助site cpfr和site cpto命令利用该漏洞读取和写入任意文件。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2015-3306
#POC DescriptionSource LinkShenlong Link
1Tool for exploit CVE-2015-3306https://github.com/shk0x/cpx_proftpdPOC Details
2Exploits the arbitrary file write bug in proftpd (CVE-2015-3306) attempts code executionhttps://github.com/nootropics/propanePOC Details
3ProFTPd 1.3.5 - (mod_copy) Remote Command Execution exploit and vulnerable containerhttps://github.com/t0kx/exploit-CVE-2015-3306POC Details
4ProFTPd 1.3.5 - File Copyhttps://github.com/davidtavarez/CVE-2015-3306POC Details
5cve-2015-3306https://github.com/cved-sources/cve-2015-3306POC Details
6cve-2015-3306 docker imagehttps://github.com/hackarada/cve-2015-3306POC Details
7Nonehttps://github.com/cdedmondson/Modified-CVE-2015-3306-ExploitPOC Details
8Converted with tweaks from a metasploit module as an exercise for OSCP studying and exploit developmenthttps://github.com/cd6629/CVE-2015-3306-Python-PoCPOC Details
9Nonehttps://github.com/0xm4ud/ProFTPD_CVE-2015-3306POC Details
10An implementation of CVE-2015-3306https://github.com/jptr218/proftpd_bypassPOC Details
11PoC for CVE-2015-3306 a arbitrary file write vulnerability in ProFTPd 1.3.5https://github.com/xchg-rax-rax/CVE-2015-3306-POC Details
12Script that exploits the vulnerability of the ProFTP 1.3.5 service with CVE-2015-3306https://github.com/JoseLRC97/ProFTPd-1.3.5-mod_copy-Remote-Command-ExecutionPOC Details
13ProFTPD 1.3.5 contains a remote code execution vulnerability via the mod_copy module which allows remote attackers to read and write to arbitrary files via the site cpfr and site cpto commands.https://github.com/projectdiscovery/nuclei-templates/blob/main/network/cves/2015/CVE-2015-3306.yamlPOC Details
14This contains single-file exploit for ProFTPd 1.3.5 mod_copy (CVE-2015-3306) vulnerability, especially for TryHackMe Kenobi Lab.https://github.com/Z3R0-0x30/CVE-2015-3306POC Details
15Nonehttps://github.com/donmedfor/CVE-2015-3306POC Details
16This is a customized script to help solve the lab on remote code execution under the CVE-2015-3306 lab.https://github.com/cybersensei-EH/hackviser_labs_CVE-2015-3306POC Details
17CVE-2015-3306 - ProFTPD - RCE Home Lab setup (Docker) easy to use for Red Teaming or Penetration Testinghttps://github.com/netw0rk7/CVE-2015-3306-Home-LabPOC Details
18Exploitation report for ProFTPD 1.3.5 mod_copy (CVE-2015-3306) lab.https://github.com/canpilayda/proftpd-mod_copy-cve-2015-3306POC Details
19Tool for exploit CVE-2015-3306https://github.com/xyk0x/cpx_proftpdPOC Details
20This contains single-file exploit for ProFTPd 1.3.5 mod_copy (CVE-2015-3306) vulnerability, especially for TryHackMe Kenobi Lab.https://github.com/Z3R0space/CVE-2015-3306POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2015-3306
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2015-3306

No comments yet


Leave a comment