Wing FTP Server SSH Public Key Authentication Bypass

Medium Nessus Plugin ID 55652

Synopsis

The remote FTP service is vulnerable to an authentication bypass attack.

Description

The remote FTP server is running a version of Wing FTP Server earlier than 3.8.8. As such, it is reportedly affected by an authentication bypass vulnerability when SSH public key authentication is used.

An attacker can exploit this issue by logging into the FTP server with a password even though the server is configured to use only public key authentication. Successful exploitation of this issue requires knowledge of valid account credentials.

Note that public key authentication configuration in Wing FTP is set on a per-user basis and that Nessus has not verified that this configuration is in effect for any users.

Solution

Upgrade to version 3.8.8 or later.

See Also

https://www.wftpserver.com/serverhistory.htm

Plugin Details

Severity: Medium

ID: 55652

File Name: wing_ftp_server_388.nasl

Version: 1.6

Type: local

Family: FTP

Published: 2011/07/22

Modified: 2018/11/15

Dependencies: 54955

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 4

Temporal Score: 3.3

Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:P/A:N

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:wftpserver:wing_ftp_server

Required KB Items: SMB/Wing_FTP/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2011/07/19

Vulnerability Publication Date: 2011/06/20

Reference Information

BID: 48335

Secunia: 44993