Issue #8764
parent
cd6dab765e
commit
c76fdb23cc
|
@ -1,30 +0,0 @@
|
||||||
id: vsftpd-backdoor
|
|
||||||
|
|
||||||
info:
|
|
||||||
name: VSFTPD 2.3.4 - Backdoor Command Execution
|
|
||||||
author: pussycat0x
|
|
||||||
severity: critical
|
|
||||||
description: VSFTPD 2.3.4 contains a backdoor command execution vulnerability.
|
|
||||||
reference:
|
|
||||||
- https://www.rapid7.com/db/modules/exploit/unix/ftp/vsftpd_234_backdoor/
|
|
||||||
remediation: This backdoor was removed on July 3rd, 2011.
|
|
||||||
classification:
|
|
||||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
|
||||||
cvss-score: 10
|
|
||||||
cwe-id: CWE-78
|
|
||||||
metadata:
|
|
||||||
max-request: 1
|
|
||||||
tags: network,vsftpd,ftp,backdoor
|
|
||||||
|
|
||||||
tcp:
|
|
||||||
- inputs:
|
|
||||||
- data: "USER anonymous\r\nPASS anonymous\r\n"
|
|
||||||
|
|
||||||
host:
|
|
||||||
- "{{Hostname}}"
|
|
||||||
port: 21
|
|
||||||
matchers:
|
|
||||||
- type: word
|
|
||||||
words:
|
|
||||||
- "vsFTPd 2.3.4"
|
|
||||||
# digest: 4b0a0048304602210082cca7986964778fcfc6983bce770fc1ff185c12808568a3954ea131adb11058022100a9ff3ff8b949e7454f4b4879ed7f88d1ff44af3cd4e098424fd42a3821a85af4:922c64590222798bb761d5b6d8e72950
|
|
Loading…
Reference in New Issue