Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2015-3306 PoC — ProFTPD mod_copy模块信息泄露漏洞

Source
Associated Vulnerability
Title:ProFTPD mod_copy模块信息泄露漏洞 (CVE-2015-3306)
Description:ProFTPD是ProFTPD团队的一套开源的FTP服务器软件。该软件具有可配置性强、安全、稳定等特点。 ProFTPD 1.3.5版本的mod_copy模块中存在安全漏洞。远程攻击者可借助site cpfr和site cpto命令利用该漏洞读取和写入任意文件。
Description
This contains single-file exploit for ProFTPd 1.3.5 mod_copy (CVE-2015-3306) vulnerability, especially for TryHackMe Kenobi Lab.
Readme
# CVE-2015-3306
This contains single-file exploit for ProFTPd 1.3.5 mod_copy (CVE-2015-3306) vulnerability, especially for TryHackMe Kenobi Lab.

## Vulnerability Description
**CVE-2015-3306** is a vulnerability found in **ProFTPd 1.3.5** due to a flaw in the **mod_copy**  module, which is responsible for enabling FTP file copy operations. This vulnerability allows a THM player to copy SSH private key to a share and mount it on local system, which allows the THM player to connect to the user using SSH private key.

## Exploit Usage
1. `sudo apt-get update`
2. `sudo apt-get install git`
3. `git clone https://github.com/Z3R0-0x30/CVE-2015-3306.git`
4. `cd CVE-2015-3306`
5. `python3 Z3R0_ProFTPexploit.py [target-IP] [SSH private key location] [destination to copy the private key]`

## Example
`python3 Z3R0_ProFTPexploit.py 10.10.132.123 /home/user/.ssh/id_rsa /var/tmp/id_rsa`
File Snapshot

[4.0K] /data/pocs/77a83e16fbc7a1488e4f57e36e3e1a83e2e2234e ├── [ 886] README.md └── [1.0K] Z3R0_ProFTPexploit.py 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.