vendor:
FreeFTPD
by:
Kingcope
9,3
CVSS
HIGH
Authentication Bypass
287
CWE
Product Name: FreeFTPD
Affected Version From: All versions
Affected Version To: All versions
Patch Exists: YES
Related CWE: N/A
CPE: //a:freeftpd
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2011
FreeFTPD all versions Remote System Level Exploit Zero-Day
This exploit allows attackers to bypass authentication and gain system level access to FreeFTPD servers. The exploit uses a modified version of ssh.exe to bypass authentication, and then uploads nullevent.exe, MSVCR100.dll, and nullevent.mof to the server. The nullevent.mof file is then used to execute the connect back shell, which will connect back to the attacker's netcat listener after 1 minute.
Mitigation:
Ensure that all FreeFTPD servers are updated to the latest version, and that authentication is enabled.