Skip to content

hack-with-ethics/vsftp_backdoor_2.3.4_exploit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

17 Commits
 
 
 
 
 
 

Repository files navigation

About vsftp backdoor 2.3.4

The vsftpd 2.3.4 backdoor represents a critical security lapse within the widely used Very Secure FTP Daemon software.

This vulnerability stemmed from the deliberate insertion of malicious code into the source package of version 2.3.4,

effectively creating a hidden entryway for unauthorized access. The backdoor's primary function was to open a command shell on TCP port 6200, granting remote attackers the ability to execute arbitrary commands on compromised servers.

Consequently, systems running this vulnerable version were exposed to significant risks, including data breaches, system compromise, and other malicious activities. The severity of this flaw necessitated immediate action to mitigate the

potential damage. The recommended solution involved upgrading vsftpd to version 2.3.5 or a later release, which patched the vulnerability and removed the backdoor. The incident, tracked as CVE-2011-2523, serves as a stark reminder of the

importance of software integrity and the need for prompt security updates.

Usage

  1. netcat Version

    [ * ] usage : vsftp_backdoor_netcat.py <Target_Ip> <Listener_Ip> <Listener_Port>

  2. socket Based

    [ * ] usage : vsftp_backdoor.py < Target Ip>

Output

Image