VSFTPD is an FTP server that it can be found in unix operating systems like Ubuntu, CentOS, Fedora and Slackware. By default this service is secure however a major incident happened in July 2011 when someone replaced the original version with a version that contained a backdoor. The backdoor exists in the version 2.3.4 of VSFTPD and it can be exploited through metasploit.

So let’s assume that we have scanned a host and we have discovered the version 2.3.4 of VSFTPD running on the system.

Discovering The VSFTPD Service


We can open the metasploit framework in order to search for the vsftpd module.

Searching for the vsftpd module


As we can see there is only one module that we can use. So we will start the configuring the module appropriately. In the next screenshot you can see the configurations that we need to do in this exploit in order to be executed successfully.

Configuring the vsftpd exploit


We will execute the module with the exploit command and we will notice that it will return a shell to us with root privileges.

vsftpd exploitation



This version of course has become obsolete so don’t expect to discover it in real world systems. However if you want to play with this vulnerable service you can find it in the metasploitable 2 virtual machine.