POC详情: 77a83e16fbc7a1488e4f57e36e3e1a83e2e2234e

来源
关联漏洞
标题: ProFTPD mod_copy模块信息泄露漏洞 (CVE-2015-3306)
描述:ProFTPD是ProFTPD团队的一套开源的FTP服务器软件。该软件具有可配置性强、安全、稳定等特点。 ProFTPD 1.3.5版本的mod_copy模块中存在安全漏洞。远程攻击者可借助site cpfr和site cpto命令利用该漏洞读取和写入任意文件。
描述
This contains single-file exploit for ProFTPd 1.3.5 mod_copy (CVE-2015-3306) vulnerability, especially for TryHackMe Kenobi Lab.
介绍
# CVE-2015-3306
This contains single-file exploit for ProFTPd 1.3.5 mod_copy (CVE-2015-3306) vulnerability, especially for TryHackMe Kenobi Lab.

## Vulnerability Description
**CVE-2015-3306** is a vulnerability found in **ProFTPd 1.3.5** due to a flaw in the **mod_copy**  module, which is responsible for enabling FTP file copy operations. This vulnerability allows a THM player to copy SSH private key to a share and mount it on local system, which allows the THM player to connect to the user using SSH private key.

## Exploit Usage
1. `sudo apt-get update`
2. `sudo apt-get install git`
3. `git clone https://github.com/Z3R0-0x30/CVE-2015-3306.git`
4. `cd CVE-2015-3306`
5. `python3 Z3R0_ProFTPexploit.py [target-IP] [SSH private key location] [destination to copy the private key]`

## Example
`python3 Z3R0_ProFTPexploit.py 10.10.132.123 /home/user/.ssh/id_rsa /var/tmp/id_rsa`
文件快照

[4.0K] /data/pocs/77a83e16fbc7a1488e4f57e36e3e1a83e2e2234e ├── [ 886] README.md └── [1.0K] Z3R0_ProFTPexploit.py 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。