Una vulnerabilidad en ProFTPD permite copia de los archivos sin permiso y la ejecución de código arbitrario

German researcher Tobias Mädel descubierto ese, bajo ciertas condiciones, ProFTPD servers are vulnerable to remote code execution and information disclosure attacks.

The root of the problem lies in the mod_copy module bug, which allows arbitrary files copying. Most often, this module is enabled by default.

“All versions of ProFTPd up to and including 1.3.6 (the problem extends to 1.3.6 only if the compilation date is earlier than 07/17/19) are vulnerable in the mod_copy module“, – reported Tobias Mädel

The bug allows an authenticated user (including an anonymous user) to copy files, even if he does not have permission to write. This behavior is caused by an error in SITE CPFR y SITE CPTO, commands ignore denyall “Limit WRITE”, which allows the user to copy the file to the current folder, even if he does not have such rights.

Medel emphasizes that in order to implement the remote execution of an arbitrary code on practice, must meet at once a number of conditions. Asi que, mod_copy must be enabled, the attacker will need access to the server (anonymous account or authorization), the server must have a file with PHP code, but not using the PHP extension, y así.

leer también: RIG explotar los operadores de reclutamiento comenzaron a distribuir el codificador ERIS través de la red

According to Shodan statistics, al menos 28,000 potentially vulnerable servers with anonymous access and more than a million ProFTPD servers as a whole can be detected on the network.

La vulnerabilidad recibido el identificador CVE-2019-12815 (Debian, Suse, Ubuntu) and is associated with the old bug CVE-2015-3306, which allowed an attacker to read and write arbitrary files using SITE CPFR and SITE CPTO.

sin embargo, currently the problem remains uncorrected. The fact is that the patch for the problem has already been written and was added retroactively to ProFTPD 1.3.6, but the developers have not yet released a new patched version. Así, if your package is compiled to 7.17.19, you are vulnerable. En este caso, you can either disable mod_copy, or you should take care of downloading and recompiling.

ProFTPd is an open source, cross-platform FTP server that supports most UNIX systems and Windows. It is one of the most popular solutions focused on UNIX platforms, along with Pure-FTPd and vsftpd.

Acerca de Trojan Killer

Trojan Killer llevar portátil en su dispositivo de memoria. Asegúrese de que usted es capaz de ayudar a su PC resistir cualquier amenaza cibernética donde quiera que vaya.

también puedes ver

Virus de Facebook - una campaña de spam moderna.

Virus de Facebook – una campaña de spam moderna.

El virus de Facebook es un nombre común para el spam que se envía de forma masiva hoy en día a través de Facebook. …

Estafa de recompensas de membresía de Google

Estafa de recompensas de membresía de Google. Lo que necesitas saber

Si sabe qué es un sitio web de recompensas por membresía de Google, tenemos malas noticias …

Deja una respuesta