nuclei-templates/network/vsftpd-detection.yaml

21 lines
458 B
YAML
Raw Normal View History

2021-06-28 18:37:15 +00:00
id: vsftpd-detection
2021-06-24 16:43:08 +00:00
info:
2021-06-28 18:37:15 +00:00
name: VSFTPD v2.3.4 Backdoor Command Execution
2021-06-24 16:43:08 +00:00
author: pussycat0x
2021-06-28 18:37:15 +00:00
severity: critical
tags: network,vsftpd,ftp
2021-06-24 16:43:08 +00:00
reference: https://www.rapid7.com/db/modules/exploit/unix/ftp/vsftpd_234_backdoor/
network:
- inputs:
- data: "USER anonymous\r\nPASS pussycat0x\r\n"
host:
2021-12-09 13:06:24 +00:00
- "{{Host}}:21"
2021-06-24 16:43:08 +00:00
- "{{Hostname}}"
matchers:
- type: word
words:
2021-06-28 18:37:15 +00:00
- "vsFTPd 2.3.4"