CVE-2010-20103

A malicious backdoor was embedded in the official ProFTPD 1.3.3c source tarball distributed between November 28 and December 2, 2010. The backdoor implements a hidden FTP command trigger that, when invoked, causes the server to execute arbitrary shell commands with root privileges. This allows remote, unauthenticated attackers to run any OS command on the FTP server host.
Configurations

Configuration 1 (hide)

cpe:2.3:a:proftpd:proftpd:1.3.3:c:*:*:*:*:*:*

History

24 Sep 2025, 17:02

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
First Time Proftpd
Proftpd proftpd
CPE cpe:2.3:a:proftpd:proftpd:1.3.3:c:*:*:*:*:*:*
References () http://www.proftpd.org/ - () http://www.proftpd.org/ - Product
References () https://advisories.checkpoint.com/defense/advisories/public/2011/cpai-2010-151.html/ - () https://advisories.checkpoint.com/defense/advisories/public/2011/cpai-2010-151.html/ - Third Party Advisory
References () https://github.com/proftpd/proftpd - () https://github.com/proftpd/proftpd - Product
References () https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/ftp/proftpd_133c_backdoor.rb - () https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/ftp/proftpd_133c_backdoor.rb - Exploit, Third Party Advisory
References () https://web.archive.org/web/20111107212129/http://rsync.proftpd.org/ - () https://web.archive.org/web/20111107212129/http://rsync.proftpd.org/ - Release Notes
References () https://www.exploit-db.com/exploits/15662 - () https://www.exploit-db.com/exploits/15662 - Exploit, VDB Entry
References () https://www.exploit-db.com/exploits/16921 - () https://www.exploit-db.com/exploits/16921 - Exploit, VDB Entry
References () https://www.vulncheck.com/advisories/proftpd-backdoor-command-execution - () https://www.vulncheck.com/advisories/proftpd-backdoor-command-execution - Third Party Advisory

22 Aug 2025, 16:15

Type Values Removed Values Added
References () https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/ftp/proftpd_133c_backdoor.rb - () https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/ftp/proftpd_133c_backdoor.rb -
References () https://www.exploit-db.com/exploits/15662 - () https://www.exploit-db.com/exploits/15662 -
References () https://www.exploit-db.com/exploits/16921 - () https://www.exploit-db.com/exploits/16921 -
Summary
  • (es) Una puerta trasera maliciosa se integró en official ProFTPD 1.3.3c source tarball, distribuido entre el 28 de noviembre y el 2 de diciembre de 2010. Esta puerta trasera implementa un disparador de comandos FTP oculto que, al ser invocado, provoca que el servidor ejecute comandos de shell arbitrarios con privilegios de root. Esto permite a atacantes remotos no autenticados ejecutar cualquier comando del sistema operativo en el host del servidor FTP.

20 Aug 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-20 16:15

Updated : 2025-09-24 17:02


NVD link : CVE-2010-20103

Mitre link : CVE-2010-20103

CVE.ORG link : CVE-2010-20103


JSON object : View

Products Affected

proftpd

  • proftpd
CWE
CWE-912

Hidden Functionality