关联漏洞
描述
Python exploit for vsftpd 2.3.4 - Backdoor Command Execution
介绍
# CVE-2011-2523 — vsFTPd 2.3.4 Backdoor Exploit
This repository contains a Python-based exploit targeting a **maliciously backdoored** version of `vsFTPd 2.3.4`. Unlike traditional vulnerabilities, this backdoor was introduced by an unauthorized modification of the official binary hosted on the vsFTPd site in 2011.
## 🧠 Vulnerability Overview
- The compromised binary listens on port **6200** after receiving a specially crafted username.
- Triggering the backdoor spawns a remote shell with **root privileges**.
- The exploit is only effective against the **backdoored binary**, not against legitimate versions of vsFTPd.
## ⚙️ Requirements
Ensure the following dependencies are installed:
```bash
sudo apt update
sudo apt install python3
```
## 📦 Installation
```bash
git clone https://github.com/BolivarJ/CVE-2011-2523.git
cd CVE-2011-2523
chmod +x exploit.py
```
## 🚀 Usage
```bash
python3 exploit.py <TARGET_IP>
```
<img width="597" height="164" alt="image" src="https://github.com/user-attachments/assets/6747ea25-7bcc-4e54-bdaa-a9dccb6ce09c" />
## 📚 References
- [CVE-2011-2523](https://www.exploit-db.com/exploits/49757)
- [Original vsFTP advisory](https://security.appspot.com/vsftpd.html)
文件快照
[4.0K] /data/pocs/e80de9e92905c5770d387bef9ef61a2632c0d27d
├── [ 278] BONUS.md
├── [1.2K] exploit.py
├── [1.0K] LICENSE
└── [1.2K] README.md
0 directories, 4 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。