Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2010-4221 PoC — ProFTPD栈缓冲区溢出漏洞

Source
Associated Vulnerability
Title:ProFTPD栈缓冲区溢出漏洞 (CVE-2010-4221)
Description:ProFTPD 是一款开放源代码FTP服务程序。 ProFTPD 1.3.3c之前版本中的netio.c文件中的pr_netio_telnet_gets函数中存在多个基于栈的缓冲区溢出漏洞。远程攻击者可以借助向(1)FTP或者(2)FTPS服务器提交与TELNET IAC转义字符有关恶意输入执行任意代码。
Description
This exploit was written to study some concepts, enjoy!
Readme
# cve-2010-4221
This exploit was written to study some concepts, enjoy!

## Usage

    Proftpd Telnet IAC remote generic exploit
    Writen by: F0rb1dd3n

    Usage: ./proftpd-exploit <target IP> <target PORT> <attack type>

    Attack Types:   0 - Socket Reuse
                    1 - Reverse Shell
                    2 - Bind Shell
                    3 - Your own shellcode (raw format)



Just type the target IP, PORT and the type of attack that you chose. The program will ask for another informations like: localhost, local port or remote bind port!

## Disclaimer

You don't need to set a listener for Reverse Shell, because the exploit will handle it for you. 
If you choose to use your own shellcode, you will need to set your listener!
File Snapshot

[4.0K] /data/pocs/ebad01177498cb77d0a902aae3982fac8b8b22e2 ├── [4.8K] hacking.h ├── [ 34K] LICENSE ├── [2.2M] proftpd_1.3.3a-4_i386.deb ├── [ 33K] proftpd-exploit ├── [ 26K] proftpd-exploit.c └── [ 748] README.md 0 directories, 6 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.