Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2015-3306 PoC — ProFTPD mod_copy模块信息泄露漏洞

Source
Associated Vulnerability
Title:ProFTPD mod_copy模块信息泄露漏洞 (CVE-2015-3306)
Description:The mod_copy module in ProFTPD 1.3.5 allows remote attackers to read and write to arbitrary files via the site cpfr and site cpto commands.
Description
An implementation of CVE-2015-3306
Readme
### This tool uses a specially craffted chain of commands to exploit [CVE-2015-3306](https://nvd.nist.gov/vuln/detail/CVE-2015-3306) and bypass the authentication system of ProFTPD's mod_copy.
## It can be downloaded [here](https://github.com/jptr218/proftpd_bypass/raw/main/proftpd_bypass.exe) (you will need to run it from the command line)
### Usage:

### `proftpd_bypass [target] [port] [(l)copy within target/(r)copy to target] [lpath] [rpath]`
File Snapshot

[4.0K] /data/pocs/d90c4fb31431e6e23f6291b31cafcc1fdf468554 ├── [116K] proftpd_bypass.exe ├── [ 450] README.md └── [4.0K] src ├── [1.1K] attack.cpp ├── [ 445] hdr.h ├── [1.4K] main.cpp └── [ 988] misc.cpp 1 directory, 6 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →