关联漏洞
描述
This contains single-file exploit for ProFTPd 1.3.5 mod_copy (CVE-2015-3306) vulnerability, especially for TryHackMe Kenobi Lab.
介绍
# CVE-2015-3306
This contains single-file exploit for ProFTPd 1.3.5 mod_copy (CVE-2015-3306) vulnerability, especially for TryHackMe Kenobi Lab.
## Vulnerability Description
**CVE-2015-3306** is a vulnerability found in **ProFTPd 1.3.5** due to a flaw in the **mod_copy** module, which is responsible for enabling FTP file copy operations. This vulnerability allows a THM player to copy SSH private key to a share and mount it on local system, which allows the THM player to connect to the user using SSH private key.
## Exploit Usage
1. `sudo apt-get update`
2. `sudo apt-get install git`
3. `git clone https://github.com/Z3R0-0x30/CVE-2015-3306.git`
4. `cd CVE-2015-3306`
5. `python3 Z3R0_ProFTPexploit.py [target-IP] [SSH private key location] [destination to copy the private key]`
## Example
`python3 Z3R0_ProFTPexploit.py 10.10.132.123 /home/user/.ssh/id_rsa /var/tmp/id_rsa`
文件快照
[4.0K] /data/pocs/77a83e16fbc7a1488e4f57e36e3e1a83e2e2234e
├── [ 886] README.md
└── [1.0K] Z3R0_ProFTPexploit.py
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。