Wing FTP Server SSH Public Key Authentication Bypass

medium Nessus Plugin ID 55652


The remote FTP service is vulnerable to an authentication bypass attack.


The remote FTP server is running a version of Wing FTP Server earlier than 3.8.8. As such, it is reportedly affected by an authentication bypass vulnerability when SSH public key authentication is used.

An attacker can exploit this issue by logging into the FTP server with a password even though the server is configured to use only public key authentication. Successful exploitation of this issue requires knowledge of valid account credentials.

Note that public key authentication configuration in Wing FTP is set on a per-user basis and that Nessus has not verified that this configuration is in effect for any users.


Upgrade to version 3.8.8 or later.

See Also

Plugin Details

Severity: Medium

ID: 55652

File Name: wing_ftp_server_388.nasl

Version: 1.6

Type: local

Family: FTP

Published: 7/22/2011

Updated: 11/15/2018

Dependencies: wing_ftp_server_detect.nasl

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 4

Temporal Score: 3.3

Vector: AV:N/AC:L/Au:S/C:N/I:P/A:N

Temporal Vector: E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:wftpserver:wing_ftp_server

Required KB Items: SMB/Wing_FTP/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 7/19/2011

Vulnerability Publication Date: 6/20/2011

Reference Information

BID: 48335

Secunia: 44993