ProFTPD Command Truncation Cross-Site Request Forgery

medium Nessus Network Monitor Plugin ID 4687

Synopsis

The remote FTP server is prone to a cross-site request forgery attack.

Description

The remote host is using ProFTPD, a free FTP server for Unix and Linux. The version of ProFTPD running on the remote host splits an overly long FTP command into a series of shorter ones and executes each in turn. If an attacker can trick a ProFTPD administrator into accessing a specially-formatted HTML link, he may be able to cause arbitrary FTP commands to be executed in the context of the affected application with the administrator's privileges.

Solution

Upgrade or patch according to vendor recommendations.

See Also

http://archives.neohapsis.com/archives/fulldisclosure/2008-09/0524.html

http://bugs.proftpd.org/show_bug.cgi?id=3115

Plugin Details

Severity: Medium

ID: 4687

Family: FTP Servers

Published: 9/22/2008

Updated: 3/6/2019

Nessus ID: 34265

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.6

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Medium

Base Score: 5.6

Temporal Score: 5.2

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:proftpd_project:proftpd

Exploitable With

Metasploit (ProFTPD 1.2 - 1.3.0 sreplace Buffer Overflow (Linux))

Reference Information

CVE: CVE-2006-5815, CVE-2008-4242

BID: 31289