Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-73rz-xdrz-ryez
Vulnerability ID VCID-73rz-xdrz-ryez
Aliases CVE-2015-3306
Summary security update
Status Published
Exploitability 2.0
Weighted Severity 0.8
Risk 1.6
Affected and Fixed Packages Package Details
Weaknesses (0)
There are no known CWE.
Data source Exploit-DB
Date added April 14, 2015
Description ProFTPd 1.3.5 - File Copy
Ransomware campaign use Known
Source publication date April 13, 2015
Exploit type remote
Platform linux
Source update date Oct. 10, 2016
Source URL http://bugs.proftpd.org/show_bug.cgi?id=4169
Data source Metasploit
Description This module exploits the SITE CPFR/CPTO mod_copy commands in ProFTPD version 1.3.5. Any unauthenticated client can leverage these commands to copy files from any part of the filesystem to a chosen destination. The copy commands are executed with the rights of the ProFTPD service, which by default runs under the privileges of the 'nobody' user. By using /proc/self/cmdline to copy a PHP payload to the website directory, PHP remote code execution is made possible.
Note
Stability:
  - crash-safe
Reliability:
  - repeatable-session
SideEffects:
  - artifacts-on-disk
  - ioc-in-logs
Ransomware campaign use Unknown
Source publication date April 22, 2015
Platform Unix
Source URL https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/unix/ftp/proftpd_modcopy_exec.rb
There are no known vectors.
Exploit Prediction Scoring System (EPSS)
Percentile 0.99845
EPSS Score 0.93681
Published At April 7, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T13:12:15.147359+00:00 Debian Oval Importer Import https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 38.0.0