Wing FTP Server SSH Public Key Authentication Bypass

Medium Nessus Plugin ID 55652


The remote FTP service is vulnerable to an authentication bypass attack.


The remote FTP server is running a version of Wing FTP Server earlier than 3.8.8. As such, it is reportedly affected by an authentication bypass vulnerability when SSH public key authentication is used.

An attacker can exploit this issue by logging into the FTP server with a password even though the server is configured to use only public key authentication. Successful exploitation of this issue requires knowledge of valid account credentials.

Note that public key authentication configuration in Wing FTP is set on a per-user basis and that Nessus has not verified that this configuration is in effect for any users.


Upgrade to version 3.8.8 or later.

See Also

Plugin Details

Severity: Medium

ID: 55652

File Name: wing_ftp_server_388.nasl

Version: $Revision: 1.3 $

Type: local

Family: FTP

Published: 2011/07/22

Modified: 2017/02/10

Dependencies: 54955

Risk Information

Risk Factor: Medium


Base Score: 4

Temporal Score: 3.3

Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:P/A:N

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:wftpserver:wing_ftp_server

Required KB Items: SMB/Wing_FTP/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2011/07/19

Vulnerability Publication Date: 2011/06/20

Reference Information

BID: 48335

OSVDB: 73206

Secunia: 44993