ProFTPD < 1.3.0rc4 Multiple Modules Authentication Bypass

medium Nessus Network Monitor Plugin ID 3970


The remote host is vulnerable to a flaw that allows for the bypassing of authentication.


The remote host is using ProFTPD, a free FTP server for Unix and Linux. According to its banner, the version of ProFTPD installed on the remote host suffers from a flaw where a user can bypass access controls. An attacker exploiting this flaw would need the ability to authenticate to the server. Successful exploitation would result in the attacker elevating privileges or accessing confidential data.


Upgrade to version 1.3.0rc4 or higher.

See Also

Plugin Details

Severity: Medium

ID: 3970

Family: FTP Servers

Published: 4/18/2007

Updated: 3/6/2019

Risk Information


Risk Factor: Medium

Base Score: 4.1

Temporal Score: 3

Vector: CVSS2#AV:A/AC:L/Au:S/C:P/I:P/A:N

Temporal Vector: CVSS2#E:U/RL:OF/RC:C


Risk Factor: Medium

Base Score: 4.6

Temporal Score: 4

Vector: CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:2.3:a:proftpd_project:proftpd:*:*:*:*:*:*:*:*

Reference Information

CVE: CVE-2007-2165

BID: 23546