Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2015-3306 PoC — ProFTPD mod_copy模块信息泄露漏洞

Source
Associated Vulnerability
Title:ProFTPD mod_copy模块信息泄露漏洞 (CVE-2015-3306)
Description:ProFTPD是ProFTPD团队的一套开源的FTP服务器软件。该软件具有可配置性强、安全、稳定等特点。 ProFTPD 1.3.5版本的mod_copy模块中存在安全漏洞。远程攻击者可借助site cpfr和site cpto命令利用该漏洞读取和写入任意文件。
Description
An implementation of CVE-2015-3306
Readme
### This tool uses a specially craffted chain of commands to exploit [CVE-2015-3306](https://nvd.nist.gov/vuln/detail/CVE-2015-3306) and bypass the authentication system of ProFTPD's mod_copy.
## It can be downloaded [here](https://github.com/jptr218/proftpd_bypass/raw/main/proftpd_bypass.exe) (you will need to run it from the command line)
### Usage:

### `proftpd_bypass [target] [port] [(l)copy within target/(r)copy to target] [lpath] [rpath]`
File Snapshot

[4.0K] /data/pocs/d90c4fb31431e6e23f6291b31cafcc1fdf468554 ├── [116K] proftpd_bypass.exe ├── [ 450] README.md └── [4.0K] src ├── [1.1K] attack.cpp ├── [ 445] hdr.h ├── [1.4K] main.cpp └── [ 988] misc.cpp 1 directory, 6 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.