Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-9273 PoC — ProFTPD 资源管理错误漏洞

Source
Associated Vulnerability
Title:ProFTPD 资源管理错误漏洞 (CVE-2020-9273)
Description:ProFTPD是ProFTPD团队的一套安全云打印解决方案。该方案支持从笔记本电脑、台式机和移动设备连接打印机进行打印。 ProFTPD 1.3.7版本中的pool.c文件的‘alloc_pool’函数存在资源管理错误漏洞。远程攻击者可借助数据传输通道利用该漏洞破坏内存池并在系统上执行任意代码。
Description
Analysis and exploitation of an use-after-free in ProFTPd
Readme
# CVE-2020-9273

These are the files I created during analysis and exploitaion of [CVE-2020-9273](https://nvd.nist.gov/vuln/detail/CVE-2020-9273) - a heap use-after-free in [ProFTPd](http://www.proftpd.org/).

Take a look at the exploit video [here](https://twitter.com/DUKPT_/status/1344481049934348288).

Description about the files in this repo:

**poc-not-really-v4.c** - an article and poc I wrote last year (oct/2020), read to understand the exploitation path;

**exploit_demo.c** - demo exploit released, with hardcoded addresses, dated from last year too;

**exploit_proftpd.c** - reliable exploit, for localhost testing, finished on 16/08/2021.

Please feel free to DM me if you have questions or comments.
File Snapshot

[4.0K] /data/pocs/05f8b80ec19c54bfbce4e134e7e58b4848b24c43 ├── [ 26K] exploit_demo.c ├── [ 43K] exploit_proftpd.c ├── [ 12K] poc-not-really-v4.c ├── [ 19M] proftpd-1.3.7rc2.tar.gz └── [ 716] README.md 0 directories, 5 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.