Cerberus FTP Server < / 6.x < Web Client Security Bypass

medium Nessus Plugin ID 73270


The FTP server installed on the remote Windows host is potentially affected by a security bypass vulnerability.


The version of Cerberus FTP Server on the remote host is a version prior to or version 6.x prior to As such, it is potentially affected by a security bypass vulnerability.

An authenticated attacker could obtain sensitive files via the HTTP/S interface.


Upgrade to Cerberus FTP Server, or later.

See Also


Plugin Details

Severity: Medium

ID: 73270

File Name: cerberus_ftp_6_0_7.nasl

Version: 1.7

Type: local

Agent: windows

Family: FTP

Published: 3/31/2014

Updated: 10/16/2020

Supported Sensors: Nessus Agent, Nessus

Risk Information

CVSS Score Rationale: No cve available: information disclosure


Risk Factor: Medium

Base Score: 4

Temporal Score: 3

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:N/A:N

CVSS Score Source: manual

Vulnerability Information

CPE: cpe:/a:cerberusftp:ftp_server

Required KB Items: SMB/CerberusFTP/Installed

Exploit Ease: No known exploits are available

Patch Publication Date: 3/11/2014

Vulnerability Publication Date: 3/11/2014

Reference Information

BID: 66322