# N/A
## 漏洞概述
ProFTPD存在一个漏洞,该漏洞允许通过补充用户组继承获得GID 0的意外访问权限,原因是`mod_sql`模块中缺乏补充用户组处理。
## 影响版本
ProFTPD 1.3.8b之前的版本(至cec01cc之前的版本)
## 漏洞细节
由于`mod_sql`模块未能正确处理补充用户组,授权过程中的补充组继承使未经授权的用户可以访问GID 0权限。
## 漏洞影响
未经授权的用户可能获得GID 0(通常与root权限相关)的访问权限,从而可能导致系统的完全控制权落入攻击者手中。
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | ProFTPD versions through 1.3.8b (before commit cec01cc) contain a vulnerability in the mod_sql module due to improper handling of supplemental groups. This flaw allows authenticated users without explicitly assigned supplemental groups to inherit root group privileges (GID 0), potentially granting unauthorized access to sensitive system resources. | https://github.com/projectdiscovery/nuclei-templates/blob/main/network/cves/2024/CVE-2024-48651.yaml | POC详情 |
标题: Supplemental group inheritance grants unintended access to GID 0 due to lack of supplemental groups from mod_sql · Issue #1830 · proftpd/proftpd · GitHub -- 🔗来源链接
标签:
神龙速读标题: Issue #1830: When no supplemental groups are provided by the underlyi… · proftpd/proftpd@cec01cc · GitHub -- 🔗来源链接
标签:
暂无评论