• XSS.stack #1 – первый литературный журнал от юзеров форума

Помогите найти эксплойт для Proftpd 1.3.5a

Пожалуйста, обратите внимание, что пользователь заблокирован
Но почему то нету эксплойта на exploit-db под версию 1.3.5а
Может потому что его нет?
 
I think this is related to the thread, I dont read the references in this post from Tenable, but the first it a ref to Release of patched version, you can diff and also look if some critical thing was patched[.]

Tenable post
ProFTP related release

Edit: The most interesting bugs about the specific version is those published on oss-sec where the author also said how he find the 'out of bound reads', using test suite with address sanitizer.
 
Последнее редактирование:
Proftpd 1.3.5 и 1.3.5а это разные версии? Но почему то нету эксплойта на exploit-db под версию 1.3.5а
до версии 1.3.6
 
до версии 1.3.6
Very interesting link, a english translation shows that it need very specific conditions to allow to RCE:
Medel emphasizes that in order to implement remote execution of arbitrary code in practice, a number of conditions will need to be met at once. So, mod_copy must be enabled, the attacker will need access to the server (an anonymous account or authorization), the server must have a file with PHP code, but not using the PHP extension, and so on.
There is no RCE on proftpd server(in this case), but still a interesting bug.
 
до версии 1.3.6
Не работает пишет exploit completed, but no session
 


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх