Enhancement: network/vsftpd-detection.yaml by mp
parent
70544cf748
commit
3ba1d427d7
|
@ -1,11 +1,17 @@
|
||||||
id: vsftpd-detection
|
id: vsftpd-detection
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: VSFTPD v2.3.4 Backdoor Command Execution
|
name: VSFTPD v2.3.4 - Backdoor Command Execution
|
||||||
author: pussycat0x
|
author: pussycat0x
|
||||||
severity: critical
|
severity: critical
|
||||||
reference:
|
reference:
|
||||||
- https://www.rapid7.com/db/modules/exploit/unix/ftp/vsftpd_234_backdoor/
|
- https://www.rapid7.com/db/modules/exploit/unix/ftp/vsftpd_234_backdoor/
|
||||||
|
classification:
|
||||||
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
||||||
|
cvss-score: 10.0
|
||||||
|
cve-id:
|
||||||
|
cwe-id: CWE-78
|
||||||
|
remediation: This backdoor was removed on July 3rd, 2011.
|
||||||
tags: network,vsftpd,ftp,backdoor
|
tags: network,vsftpd,ftp,backdoor
|
||||||
|
|
||||||
network:
|
network:
|
||||||
|
@ -20,3 +26,5 @@ network:
|
||||||
- type: word
|
- type: word
|
||||||
words:
|
words:
|
||||||
- "vsFTPd 2.3.4"
|
- "vsFTPd 2.3.4"
|
||||||
|
|
||||||
|
# Enhanced by mp on 2022/05/23
|
||||||
|
|
Loading…
Reference in New Issue