ProFTPD Command Truncation Cross-Site Request Forgery

medium Nessus Plugin ID 34265
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote FTP server is prone to a cross-site request forgery attack.

Description

The remote host is using ProFTPD, a free FTP server for Unix and Linux.

The version of ProFTPD running on the remote host splits an overly long FTP command into a series of shorter ones and executes each in turn. If an attacker can trick a ProFTPD administrator into accessing a specially-formatted HTML link, arbitrary FTP commands could be executed in the context of the affected application with the administrator's privileges.

Solution

Apply the patch included in the bug report or upgrade to the latest version in CVS.

See Also

https://seclists.org/fulldisclosure/2008/Sep/529

http://bugs.proftpd.org/show_bug.cgi?id=3115

Plugin Details

Severity: Medium

ID: 34265

File Name: proftpd_cmd_truncation_csrf.nasl

Version: 1.20

Type: remote

Family: FTP

Published: 9/23/2008

Updated: 3/27/2020

Dependencies: ftpserver_detect_type_nd_version.nasl

Configuration: Enable paranoid mode

Risk Information

CVSS Score Source: CVE-2008-4242

VPR

Risk Factor: High

Score: 7.3

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:proftpd:proftpd

Required KB Items: Settings/ParanoidReport

Exploit Ease: No known exploits are available

Reference Information

CVE: CVE-2008-4242

BID: 31289

CWE: 352