10
CVSSv2

CVE-2011-2523

Published: 27/11/2019 Updated: 12/04/2021
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

vsftpd 2.3.4 downloaded between 20110630 and 20110703 contains a backdoor which opens a shell on port 6200/tcp.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

vsftpd project vsftpd 2.3.4

debian debian linux 8.0

debian debian linux 9.0

debian debian linux 10.0

Exploits

vsftpd version 234 backdoor remote command execution exploit ...

Nmap Scripts

ftp-vsftpd-backdoor

Tests for the presence of the vsFTPd 2.3.4 backdoor reported on 2011-07-04 (CVE-2011-2523). This script attempts to exploit the backdoor using the innocuous id command by default, but that can be changed with the exploit.cmd or ftp-vsftpd-backdoor.cmd script arguments.

nmap --script ftp-vsftpd-backdoor -p 21 <host>

PORT STATE SERVICE 21/tcp open ftp | ftp-vsftpd-backdoor: | VULNERABLE: | vsFTPd version 2.3.4 backdoor | State: VULNERABLE (Exploitable) | IDs: CVE:CVE-2011-2523 OSVDB:73573 | Description: | vsFTPd version 2.3.4 backdoor, this was reported on 2011-07-04. | Disclosure date: 2011-07-03 | Exploit results: | The backdoor was already triggered | Shell command: id | Results: uid=0(root) gid=0(root) groups=0(root) | References: | http://osvdb.org/73573 | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2523 | http://scarybeastsecurity.blogspot.com/2011/07/alert-vsftpd-download-backdoored.html |_ https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/ftp/vsftpd_234_backdoor.rb
ftp-vsftpd-backdoor

Tests for the presence of the vsFTPd 2.3.4 backdoor reported on 2011-07-04 (CVE-2011-2523). This script attempts to exploit the backdoor using the innocuous id command by default, but that can be changed with the exploit.cmd or ftp-vsftpd-backdoor.cmd script arguments.

nmap --script ftp-vsftpd-backdoor -p 21 <host>

PORT STATE SERVICE 21/tcp open ftp | ftp-vsftpd-backdoor: | VULNERABLE: | vsFTPd version 2.3.4 backdoor | State: VULNERABLE (Exploitable) | IDs: CVE:CVE-2011-2523 BID:48539 | Description: | vsFTPd version 2.3.4 backdoor, this was reported on 2011-07-04. | Disclosure date: 2011-07-03 | Exploit results: | The backdoor was already triggered | Shell command: id | Results: uid=0(root) gid=0(root) groups=0(root) | References: | https://www.securityfocus.com/bid/48539 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2523 | http://scarybeastsecurity.blogspot.com/2011/07/alert-vsftpd-download-backdoored.html |_ https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/ftp/vsftpd_234_backdoor.rb

Github Repositories

Python exploit for vsftpd 2.3.4 - Backdoor Command Execution

CVE-2011-2523 - vsftpd 234 Exploit Description vsftpd, which stands for Very Secure FTP Daemon,is an FTP server for Unix-like systems, including Linux It is licensed under the GNU General Public License It supports IPv6 and SSL In July 2011, it was discovered that vsftpd version 234 downloadable from the master site had been compromised Users logging into a comprom

CVE-2011-2523 exploit

CVE-2011-2523 Exploit for vsFTPd backdoor vulnerabilty written in python using Pwntools Usage pip3 install pwntools python3 /CVE-2011-2523py &lt;IP&gt; &lt;PORT&gt; (optional)

Python exploit for vsftpd 2.3.4 - Backdoor Command Execution

CVE-2011-2523 Python exploit for vsftpd 234 - Backdoor Command Execution Description vsftpd, which stands for Very Secure FTP Daemon,is an FTP server for Unix-like systems, including Linux It is licensed under the GNU General Public License It supports IPv6 and SSL In July 2011, it was discovered that vsftpd version 234 downloadable from the master site had been comp

Scenario Capture the Flag - CVE-2011-2523 Capture the decrypted /etc/shadow and /etc/passwd file from vulnerable Metasploitable 2 server Setup Enviornment Step 1: Download an unzip virtual machine For this CTF, we run VMware Workstation Pro with two virtual machines We utilize Kali Linux as the attacker's machine and Metasploitable 2 as the vulnerable machine Download

vsftpd 2.3.4 Backdoor Exploit

vsftpd 234 Backdoor Exploit FTP Server: vsftpd Vulnerable version: 234 CVE: CVE-2011-2523 Vulnerability: Backdoor on port 6200 opened when user entered strings appending :) in ftp USER param Notes: The RCE doesn't need to be authenticated

Python exploit for vsftpd 2.3.4 - Backdoor Command Execution

CVE-2011-2523 - vsftpd 234 Exploit Description vsftpd, which stands for Very Secure FTP Daemon,is an FTP server for Unix-like systems, including Linux It is licensed under the GNU General Public License It supports IPv6 and SSL In July 2011, it was discovered that vsftpd version 234 downloadable from the master site had been compromised Users logging into a comprom

Week 16 Homework Submission File: Penetration Testing 1 Step 1: Google Dorking Using Google, can you identify who the Chief Executive Officer of Altoro Mutual is: site:demotestfirenet executives This is the result: demotestfirenet/indexjsp?content=inside_executiveshtm How can this information be helpful to an attacker: This can be useful to an attacker to send phis

Python exploit for the vsftpd 2.3.4

vsftpd_234_Exploit Python exploit for the vsftpd 234 CVE-2011-2523 Discription vsftpd, which stands for Very Secure FTP Daemon,is an FTP server for Unix-like systems, including Linux It is licensed under the GNU General Public License It supports IPv6 and SSL In July 2011, it was discovered that vsftpd version 234 downloadable from the master site had been comprom

This tool receives a security tool command with its parameters as input, runs the tool in a new process and parses the result returning a normalized json as response.

UNIversal SECurity Barber There are a lot of great security tools which give us A LOT of information about the targets we are testing The problem is that there is no easy way to analyse that information because the output of the tools does not follow any standard This project, the "UNIversal SECurity Barber", aims to solve de problem building a tool that receives a

A rewritten exploit script (Metasploit) for the vsftpd service [CVE 2011-2523]

The vsftpd-exploitation The following is rewritten old exploit (Metasploit) for the vulnerable FTPD service based on the stfpd 234 Backdoor command execution exploit available in the framework According to Metasploit, this module "exploits a malicious backdoor that was added to the VSFTPD download archive" The original file is the 17491rb (Ruby file), which beside

Python exploit for vsftpd 2.3.4 - Backdoor Command Execution

CVE-2011-2523 - vsftpd 234 Exploit Description Very Secure FTP Daemon (vsftpd) is an FTP server for Unix-like platforms, including Linux It is distributed under the terms of the GNU General Public Licence It supports IPv6 as well as SSL It was revealed in July 2011 that vsftpd version 234, which could be downloaded from the master site, had been compromised Users login

Covid v2 Botnet Disclaimers: this botnet is for educational purpose and ethical use only! any other use is on the user's own responsibility, and we are not responsible for any of the user's usage of it! What can it do? attack targets by a list attack targets on local network with a scanner spread through CVE-2012-1823 (php-cgi Argument Injection) spread through CVE-2

mdr jadore

EPITECH-ProjectInfoSec The company is called redacted Scope of engagement 1010110/24 IP addresses found 1010111 1010116 thermostatredactedlan 1010117 mqttredactedlan 10101122 blogredactedlan 10101197 fileserverredactedlan 101011102 workstation1102redactedlan 101011111 tserge-ubunturedactedlan 101011123 lewis-ubunturedactedlan 10101114

A Red Team Engagement is a cybersecurity exercise designed to simulate real-world attacks and security breaches on an organization's systems, networks, and applications. The primary goal of a red team engagement is to identify vulnerabilities, weaknesses, and potential points of exploitation within an organization's defenses.

Red Team Engagement Simulation A Red Team Engagement is a cybersecurity exercise designed to simulate real-world attacks and security breaches on an organization's systems, networks, and applications The primary goal of a red team engagement is to identify vulnerabilities, weaknesses, and potential points of exploitation within an organization's defenses Initial&

Week 16 Homework Penetration Testing 1

Week 16 Homework Submission File: Penetration Testing 1 Step 1: Google Dorking Using Google, can you identify who the Chief Executive Officer of Altoro Mutual is: On googlecom, find: site:demotestfirenet intext:executive I got this info: Executives &amp; Management - Altoro Mutual Link: demotestfirenet/indexjsp?content=inside_executiveshtm Karl Fitzgerald is the Ch

Python exploit for CVE-2011-2523 (VSFTPD 2.3.4 Backdoor Command Execution)

-CVE-2011-2523 This is a python3 script to exploit the CVE-2011-2523, the VSFTPD 234 Backdoor Command Execution, using socket and telnetlib modules How to install ? # Install dependencies : pip3 install termcolor argparse # Git cloning the project git clone githubcom/0xSojalSec/CVE-2011-2523git cd CVE-2011-2523/ # Launch it : chmod +x exploitpy /exploitpy -h /

FreePascal implementation of the vsFTPD 2.3.4 CVE-2011-2523

CVE-2011-2523 FreePascal implementation of CVE-2011-2523 Vulnerability vsFTPD 234 Using :) in the username opens a backdoor as root on port 6200 on the target Requirements Synapse If you don't have it, install through the OPM

An exploit to get root in vsftpd 2.3.4 (CVE-2011-2523) written in python

vsftpd234PyExploit An exploit to get root in vsftpd 234 (CVE-2011-2523) written in python Usage: /exploitpy ${Victim_IP_address} Attention! The exploit open a shell that it is not reverse I recommend to open a reverse shell after the exploit I didnt do it here because i didnt want to assume what kind of tools and permissions we have at victim's host You can find it

vsftpd_234_Exploit Python exploit for the vsftpd 234 CVE-2011-2523 Discription vsftpd, which stands for Very Secure FTP Daemon,is &gt; In July 2011, it was discovered that vsftpd version 2&gt; Requirements sudo apt update sudo apt install python3 sudo apt install python3-pip sudo python3 -m pip install pwntools Install sudo git clone github

Nmap and NSE command line wrapper in the style of Metasploit

ObsidianSailboat Nmap and NSE command line wrapper the vision A tool that integrates a bunch of NSE scripts together to build a picture of a host that we can reason over and discover various properties I got sick of either losing data about hosts (dropping it on the floor), wrapping glue code to bridge from one tool to another, and the tons of boilerplate calls I make to vario

https://www.exploit-db.com/exploits/49757

CVE-2011-2523 Esta fue una vulnerabilidad que se encuentra en el servicio vsFTPd 234, que a traves del puerto 6200 hace un redireccionamiento dando paso a una shell interactiva, interpretando asi comandos wwwexploit-dbcom/exploits/49757

HTB write-ups going through TJnull's VM list on HackTheBox.

HackTheBox Writeups A collection of write-ups going through TJnull's VM list for machines hosted on HackTheBox Linux Boxes Machine Tags Writeup #CVE-2004-2687 #CVE-2007-2447 #CVE-2011-2523 #vsFTPd #smbd #nmap HTB Lame #shellshock #CVE-2014-6271 #perl HTB Shocker HTB Bashed #mimebypass #ifcfg HTB Networked Windows Boxes

vsftpd_234_Exploit Python exploit for the vsftpd 234 CVE-2011-2523 Discription vsftpd, which stands for Very Secure FTP Daemon,is an FTP server for Unix-like systems, including Linux It is licensed under the GNU General Public License It supports IPv6 and SSL In July 2011, it was discovered that vsftpd version 234 downloadable from the master site had been comprom

Домашнее задание "Уязвимости и атаки на информационные системы" - Подус Сергей Задание 1 Скачайте и установите виртуальную машину Metasploitable: sourceforgenet/projects/metasploitable/ Это типовая ОС для экспериментов в о

A tool that exploits the CVE-2011-2523 vulnerability.

VSFTPD Exploit A script that exploits the CVE-2011-2523 vulnerability in vsftpd Installation git clone githubcom/chleba124/vsftpd-exploitgit cd vsftpd-exploit python -m pip install -r requirementstxt py mainpy FAQ Is this safe? Yes it is and it is open source so you can read the code How does it work? It connects to t

Rust exploit for vsftpd version 2.3.4

Rust exploit for vsftpd 234 The Rust code exploits the CVE-2011-2523 which concerns the version 234 of vsftpd At first, it tries to log in with a username containing the :) smileyface and a random password This appears to open a root backdoor on the port 6200 of the server This code was written to learn more about the vulnerability and the rust programming language Usag

Домашнее задание к занятию «Уязвимости и атаки на информационные системы» Задание 1 Скачайте и установите виртуальную машину Metasploitable: sourceforgenet/projects/metasploitable/ Это типовая ОС для экспериментов в обл

nmap network mapper ports direct trafic 65535 well-known ports 1023 version check $ nmap -v Starting Nmap 791 ( nmaporg ) at 2021-08-02 12:13 IST Read data files from: /usr/bin//share/nmap WARNING: No targets were specified, so 0 hosts scanned Nmap done: 0 IP addresses (0 hosts up) scanned in 005 seconds syn scan $ sudo

EXPLOIT_CVE CVE-2011-2523 - vsftpd 234 Exploit Description vsftpd, which stands for Very Secure FTP Daemon,is an FTP server for Unix-like systems, including Linux It is licensed under the GNU General Public License It supports IPv6 and SSL In July 2011, it was discovered that vsftpd version 234 downloadable from the master site had been compromised Users logging in

vsftpd_234_Exploit Python exploit for the vsftpd 234 CVE-2011-2523 Discription vsftpd, which stands for Very Secure FTP Daemon,is an FTP server for Unix-like systems, including Linux It is licensed under the GNU General Public License It supports IPv6 and SSL In July 2011, it was discovered that vsftpd version 234 downloadable from the master site had been comprom

Writeups for Cybertalents CTF Challenges.

CyberTalents Challenges Writeups Certified SOC ANALYST Challenges Difficulty Tags 55H-Access Easy Splunk, Forensic, SSH Backdoor Medium Tshark, Wireshark, vsFTPD, CVE-2011-2523 Bean Easy LFI (Local file inclusion), Web, dirb, Ngix Web Server, Bean Detector Medium Fuzzing, Log analysis, Forensic, Web Creepy-DNS Easy DNS, DNS Zone Transfer, Tshark, Decoding Four

Week 16 Homework Submission File: Penetration Testing 1 Prepared by Shamsul Chowdhury Step 1: Google Dorking Using Google, can you identify who the Chief Executive Officer of Altoro Mutual is: On googlecom, find: site:demotestfirenet intext:executive I got this info: Executives &amp; Management - Altoro Mutual Link: demotestfirenet/indexjsp?content=inside_executives

Python exploit for CVE-2011-2523 (VSFTPD 2.3.4 Backdoor Command Execution)

CVE-2011-2523-poc This is a python3 script to exploit the CVE-2011-2523, the VSFTPD 234 Backdoor Command Execution, using socket and telnetlib modules

This is the assessment project for the Ethical Hacking Bootcamp by techcareer I wrote two exploits for vulnerabilities in FTP / vsftpd 234 (CVE-2011-2523) and Samba 300–3025rc3 (CVE-2007-2447) services Below is given how to run the script For FTP: python mainpy -s ftp -rhost &lt;host_ip&gt; -rport &lt;host_port&gt; For Samba: python mainpy -s sa

vsftpd 2.3.4 backdoor command execution vulnerability exploit written in python

vsftpd_backdoor_exploit vsftpd 234 backdoor command execution vulnerability exploit written in python this vulnerability was found in vsftpd version 234, the error lies in the validation of the ftp username, if you put the username with a smiley face ':)' next to it, it opens a backdoor shell in port 6200 where you can send commands remotes to the compromised serv

Step 1: Google Dorking Using Google, can you identify who the Chief Executive Officer of Altoro Mutual is: On googlecom, find: site:demotestfirenet intext:executive I got this info: Executives &amp; Management - Altoro Mutual Link: demotestfirenet/indexjsp?content=inside_executiveshtm Karl Fitzgerald is the Chairman &amp; Chief Executive Officer How can this

A basic script that exploits CVE-2011-2523

SmileySploit A basic script that exploits CVE-2011-2523 Overview In 2011, an integrated backdoor was found on vsFTPd servers running version 234, in which using a smiley emoticon ":)" triggers a reverse connection to an attacker With this, it is extremely easy to create an exploit script and gain access to a system vulnerable to this flaw By using said emoticon du

vsftpd_234_Exploit Python exploit for the vsftpd 234 CVE-2011-2523 Discription vsftpd, which stands for Very Secure FTP Daemon,is an FTP server for Unix-like systems, including Linux It is licensed under the GNU General Public License It supports IPv6 and SSL In July 2011, it was discovered that vsftpd version 234 downloadable from the master site had been comprom