POC详情: e80de9e92905c5770d387bef9ef61a2632c0d27d

来源
关联漏洞
标题: vsftpd 操作系统命令注入漏洞 (CVE-2011-2523)
描述:vsftpd是一款用于类Unix系统的FTP(文件传输协议)服务器。 vsftpd 2.3.4版本(2011年6月30日至2011年7月3日期间下载)中存在安全漏洞,该漏洞源于软件中存在可以打开shell的后门。攻击者可利用该漏洞执行命令。
描述
Python exploit for vsftpd 2.3.4 - Backdoor Command Execution
介绍
# CVE-2011-2523 — vsFTPd 2.3.4 Backdoor Exploit

This repository contains a Python-based exploit targeting a **maliciously backdoored** version of `vsFTPd 2.3.4`. Unlike traditional vulnerabilities, this backdoor was introduced by an unauthorized modification of the official binary hosted on the vsFTPd site in 2011.

## 🧠 Vulnerability Overview

- The compromised binary listens on port **6200** after receiving a specially crafted username.
- Triggering the backdoor spawns a remote shell with **root privileges**.
- The exploit is only effective against the **backdoored binary**, not against legitimate versions of vsFTPd.

## ⚙️ Requirements

Ensure the following dependencies are installed:

```bash
sudo apt update
sudo apt install python3
```
## 📦 Installation

```bash
git clone https://github.com/BolivarJ/CVE-2011-2523.git
cd CVE-2011-2523
chmod +x exploit.py
```

## 🚀 Usage

```bash
python3 exploit.py <TARGET_IP>
```
<img width="597" height="164" alt="image" src="https://github.com/user-attachments/assets/6747ea25-7bcc-4e54-bdaa-a9dccb6ce09c" />

## 📚 References
- [CVE-2011-2523](https://www.exploit-db.com/exploits/49757)
- [Original vsFTP advisory](https://security.appspot.com/vsftpd.html)





文件快照

[4.0K] /data/pocs/e80de9e92905c5770d387bef9ef61a2632c0d27d ├── [ 278] BONUS.md ├── [1.2K] exploit.py ├── [1.0K] LICENSE └── [1.2K] README.md 0 directories, 4 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。