Search for vulnerabilities
Vulnerability details: VCID-6e9j-gvu7-puh6
Vulnerability ID VCID-6e9j-gvu7-puh6
Aliases CVE-2015-3306
Summary security update
Status Published
Exploitability 2.0
Weighted Severity 0.8
Risk 1.6
Affected and Fixed Packages Package Details
Weaknesses (0)
There are no known CWE.
Data source Metasploit
Description This module exploits the SITE CPFR/CPTO mod_copy commands in ProFTPD version 1.3.5. Any unauthenticated client can leverage these commands to copy files from any part of the filesystem to a chosen destination. The copy commands are executed with the rights of the ProFTPD service, which by default runs under the privileges of the 'nobody' user. By using /proc/self/cmdline to copy a PHP payload to the website directory, PHP remote code execution is made possible.
Note
Stability:
  - crash-safe
Reliability:
  - repeatable-session
SideEffects:
  - artifacts-on-disk
  - ioc-in-logs
Ransomware campaign use Unknown
Source publication date April 22, 2015
Platform Unix
Source URL https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/unix/ftp/proftpd_modcopy_exec.rb
Data source Exploit-DB
Date added April 14, 2015
Description ProFTPd 1.3.5 - File Copy
Ransomware campaign use Known
Source publication date April 13, 2015
Exploit type remote
Platform linux
Source update date Oct. 10, 2016
Source URL http://bugs.proftpd.org/show_bug.cgi?id=4169
There are no known vectors.
Exploit Prediction Scoring System (EPSS)
Percentile 0.99874
EPSS Score 0.93943
Published At Sept. 12, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T09:55:45.969662+00:00 Debian Oval Importer Import https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 37.0.0