Cerberus FTP Server < / 6.x < Web Client Security Bypass

medium Nessus Plugin ID 73270


The FTP server installed on the remote Windows host is potentially affected by a security bypass vulnerability.


The version of Cerberus FTP Server on the remote host is a version prior to or version 6.x prior to As such, it is potentially affected by a security bypass vulnerability.

An authenticated attacker could obtain sensitive files via the HTTP/S interface.


Upgrade to Cerberus FTP Server, or later.

See Also


Plugin Details

Severity: Medium

ID: 73270

File Name: cerberus_ftp_6_0_7.nasl

Version: 1.7

Type: local

Agent: windows

Family: FTP

Published: 3/31/2014

Updated: 10/16/2020

Dependencies: cerberus_ftp_installed.nasl

Risk Information

Risk Factor: Medium

CVSS Score Source: manual

CVSS Score Rationale: No cve available: information disclosure

CVSS v2.0

Base Score: 4

Temporal Score: 3

Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N

Temporal Vector: E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:cerberusftp:ftp_server

Required KB Items: SMB/CerberusFTP/Installed

Exploit Ease: No known exploits are available

Patch Publication Date: 3/11/2014

Vulnerability Publication Date: 3/11/2014

Reference Information

BID: 66322