ProFTPD < 1.3.0rc4 Multiple Modules Authentication Bypass

Medium Nessus Network Monitor Plugin ID 3970

Synopsis

The remote host is vulnerable to a flaw that allows for the bypassing of authentication.

Description

The remote host is using ProFTPD, a free FTP server for Unix and Linux. According to its banner, the version of ProFTPD installed on the remote host suffers from a flaw where a user can bypass access controls. An attacker exploiting this flaw would need the ability to authenticate to the server. Successful exploitation would result in the attacker elevating privileges or accessing confidential data.

Solution

Upgrade to version 1.3.0rc4 or higher.

See Also

http://bugs.proftpd.org/show_bug.cgi?id=2922

Plugin Details

Severity: Medium

ID: 3970

Family: FTP Servers

Published: 2007/04/18

Updated: 2019/03/06

Dependencies: 1803, 1804, 3222

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 4.1

Temporal Score: 3

Vector: CVSS2#AV:A/AC:L/Au:S/C:P/I:P/A:N

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSS v3.0

Base Score: 4.6

Temporal Score: 4

Vector: CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:proftpd_project:proftpd

Reference Information

CVE: CVE-2007-2165

BID: 23546