2021-06-28 18:37:15 +00:00
|
|
|
id: vsftpd-detection
|
2021-06-24 16:43:08 +00:00
|
|
|
|
|
|
|
info:
|
2021-06-28 18:37:15 +00:00
|
|
|
name: VSFTPD v2.3.4 Backdoor Command Execution
|
2021-06-24 16:43:08 +00:00
|
|
|
author: pussycat0x
|
2021-06-28 18:37:15 +00:00
|
|
|
severity: critical
|
|
|
|
tags: network,vsftpd,ftp
|
2021-06-24 16:43:08 +00:00
|
|
|
reference: https://www.rapid7.com/db/modules/exploit/unix/ftp/vsftpd_234_backdoor/
|
|
|
|
|
|
|
|
network:
|
|
|
|
- inputs:
|
|
|
|
- data: "USER anonymous\r\nPASS pussycat0x\r\n"
|
|
|
|
|
|
|
|
host:
|
2021-12-09 13:06:24 +00:00
|
|
|
- "{{Host}}:21"
|
2021-06-24 16:43:08 +00:00
|
|
|
- "{{Hostname}}"
|
|
|
|
|
|
|
|
matchers:
|
|
|
|
- type: word
|
|
|
|
words:
|
2021-06-28 18:37:15 +00:00
|
|
|
- "vsFTPd 2.3.4"
|