/usr/bin/env python# CVE-2015-3306 exploit by t0kx# https://github.com/t0kx/exploit-CVE-2015-3306importreimportsocketimportrequestsimportargparseclassExploit:def__init__(self, host, port, path):self.__sock =Noneself.__host = hostself.__port = portself.__path = pathdef__connect(self)...
/usr/bin/env python# CVE-2015-3306 exploit by t0kx# https://github.com/t0kx/exploit-CVE-2015-3306importreimportsocketimportrequestsimportargparseclassExploit:def__init__(self, host, port, path):self.__sock =Noneself.__host = hostself.__port = portself.__path = pathdef__connect(self)...
#!/usr/bin/env python # CVE-2015-3306 exploit by t0kx # https://github.com/t0kx/exploit-CVE-2015-3306 import re import socket import requests import argparse class Exploit: def __init__(self, host, port, path): self.__sock = None self.__host = host self.__port = port self....
print("[+] CVE-2015-3306 exploit by t0kx") print("[+] Exploiting "+args.host+":"+args.port) exploit=Exploit(args.host,int(args.port),args.path) exploit.run() if__name__=="__main__": parser=argparse.ArgumentParser() parser.add_argument('--host',required=True) ...
近日,开源 FTP 服务器程序 ProFTPd 被曝出一个未授权文件复制漏洞(CVE-2015-3306),该漏洞是由于 ProFTPd 中的 mod_copy 模块造成的。攻击者在一定条件下可利用该漏洞直接获得服务器权限。通过网络空间搜索引擎 ZoomEye 进行全网搜索,发现 ProFTPd 在全球网络空间中被普遍使用,该漏洞对欧美国家的服务器影响较大,中国...
Upstream information CVE-2015-3306 at MITRE Description The mod_copy module in ProFTPD 1.3.5 allows remote attackers to read and write to arbitrary files via the site cpfr and site cpto commands. SUSE information Overall state of this security issue: Does not affect SUSE products ...
CVE-2015-0240 CVE-2015-1233 CVE-2015-1242 CVE-2015-1268 CVE-2015-1635 CVE-2015-1830 CVE-2015-2177 CVE-2015-3306 CVE-2015-5119 CVE-2015-5531 CVE-2015-6086 CVE-2015-6755 CVE-2015-6764 CVE-2015-6769 CVE-2015-6770 CVE-2015-6771 CVE-2015-7450 CVE-2015-7501 CVE-2015-7545 CVE-2015-85...
随意翻找文件,找到mysql数据库账号密码,于是扫描端口发现开启3306,尝试连接,发现似乎做了IP白名单限制...
[+] 192.168.1.6: - 192.168.1.6:3306 - TCP OPEN [+] 192.168.1.6: - 192.168.1.6:3632 - TCP OPEN [+] 192.168.1.6: - 192.168.1.6:5901 - TCP OPEN [+] 192.168.1.6: - 192.168.1.6:6001 - TCP OPEN [+] 192.168.1.6: - 192.168.1.6:8080 - TCP OPEN [+] 192.168.1.6: - 192.168.1.6...
[+] 192.168.1.6: - 192.168.1.6:3306 - TCP OPEN [+] 192.168.1.6: - 192.168.1.6:3632 - TCP OPEN [+] 192.168.1.6: - 192.168.1.6:5901 - TCP OPEN [+] 192.168.1.6: - 192.168.1.6:6001 - TCP OPEN [+] 192.168.1.6: - 192.168.1.6:8080 - TCP OPEN [+] 192.168.1.6: - 192.168.1.6...