Cerberus FTP Server < 5.0.8.0 / 6.x < 6.0.7.0 Web Client Security Bypass

medium Nessus Plugin ID 73270

Synopsis

The FTP server installed on the remote Windows host is potentially affected by a security bypass vulnerability.

Description

The version of Cerberus FTP Server on the remote host is a version prior to 5.0.8.0 or version 6.x prior to 6.0.7.0. As such, it is potentially affected by a security bypass vulnerability.

An authenticated attacker could obtain sensitive files via the HTTP/S interface.

Solution

Upgrade to Cerberus FTP Server 5.0.8.0, 6.0.7.0 or later.

See Also

https://www.cerberusftp.com/products/releasenotes/

Plugin Details

Severity: Medium

ID: 73270

File Name: cerberus_ftp_6_0_7.nasl

Version: 1.7

Type: local

Agent: windows

Family: FTP

Published: 3/31/2014

Updated: 10/16/2020

Supported Sensors: Nessus Agent, Nessus

Risk Information

CVSS Score Rationale: No cve available: information disclosure

CVSS v2

Risk Factor: Medium

Base Score: 4

Temporal Score: 3

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:N/A:N

CVSS Score Source: manual

Vulnerability Information

CPE: cpe:/a:cerberusftp:ftp_server

Required KB Items: SMB/CerberusFTP/Installed

Exploit Ease: No known exploits are available

Patch Publication Date: 3/11/2014

Vulnerability Publication Date: 3/11/2014

Reference Information

BID: 66322