Cerberus FTP Server < 5.0.8.0 / 6.x < 6.0.7.0 Web Client Security Bypass

Medium Nessus Plugin ID 73270

Synopsis

The FTP server installed on the remote Windows host is potentially affected by a security bypass vulnerability.

Description

The version of Cerberus FTP Server on the remote host is a version prior to 5.0.8.0 or version 6.x prior to 6.0.7.0. As such, it is potentially affected by a security bypass vulnerability.

An authenticated attacker could obtain sensitive files via the HTTP/S interface.

Solution

Upgrade to Cerberus FTP Server 5.0.8.0, 6.0.7.0 or later.

See Also

https://www.cerberusftp.com/products/releasenotes.html

Plugin Details

Severity: Medium

ID: 73270

File Name: cerberus_ftp_6_0_7.nasl

Version: $Revision: 1.2 $

Type: local

Family: FTP

Published: 2014/03/31

Modified: 2017/04/27

Dependencies: 40820

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 4

Temporal Score: 3.5

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:N/A:N

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:cerberusftp:ftp_server

Required KB Items: SMB/CerberusFTP/Installed

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2014/03/11

Vulnerability Publication Date: 2014/03/11

Reference Information

BID: 66322