Wing FTP Server SSH Public Key Authentication Bypass

medium Nessus Plugin ID 55652
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


The remote FTP service is vulnerable to an authentication bypass attack.


The remote FTP server is running a version of Wing FTP Server earlier than 3.8.8. As such, it is reportedly affected by an authentication bypass vulnerability when SSH public key authentication is used.

An attacker can exploit this issue by logging into the FTP server with a password even though the server is configured to use only public key authentication. Successful exploitation of this issue requires knowledge of valid account credentials.

Note that public key authentication configuration in Wing FTP is set on a per-user basis and that Nessus has not verified that this configuration is in effect for any users.


Upgrade to version 3.8.8 or later.

See Also

Plugin Details

Severity: Medium

ID: 55652

File Name: wing_ftp_server_388.nasl

Version: 1.6

Type: local

Family: FTP

Published: 7/22/2011

Updated: 11/15/2018

Dependencies: wing_ftp_server_detect.nasl

Risk Information


Risk Factor: Medium

Base Score: 4

Temporal Score: 3.3

Vector: AV:N/AC:L/Au:S/C:N/I:P/A:N

Temporal Vector: E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:wftpserver:wing_ftp_server

Required KB Items: SMB/Wing_FTP/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 7/19/2011

Vulnerability Publication Date: 6/20/2011

Reference Information

BID: 48335

Secunia: 44993