ProFTPD <= 1.3.5b Remote Code Execution

High Nessus Network Monitor Plugin ID 701079

Synopsis

The remote FTP server is affected by a code execution vulnerability.

Description

The remote host is using ProFTPD, a free FTP server for Unix and Linux.

All versions of ProFTPD incliuding 1.3.5b are affected by a remote code execution vulnerability due to an arbitrary file copy flaw in the mod_copy module, which is part of the default installation of ProFTPD and 'enabled by default in most distributions' according to the researcher who discovered the bug. According to the ProFTPD bug report, mod_copy does not honor the %lt;Limit READ> and <Limit WRITE> configuration settings, thereby allowing a remote attacker write permissions to 'copy any file on the FTP server' using CPFR and CPTO commands.

Solution

Upgrade to the latest version. As a workaround, disable mod_copy in the ProFTPd configuration file.

See Also

http://bugs.proftpd.org/show_bug.cgi?id=4372

https://tbspace.de/cve201912815proftpd.html

http://www.proftpd.org/docs/contrib/mod_copy.html

Plugin Details

Severity: High

ID: 701079

Family: FTP Servers

Published: 2019/07/23

Updated: 2019/07/23

Dependencies: 1803, 1804

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 8.5

Temporal Score: 6.3

Vector: CVSS2#AV:N/AC:M/Au:S/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSS v3.0

Base Score: 8

Temporal Score: 7

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:proftpd:proftpd

Patch Publication Date: 2019/07/23

Vulnerability Publication Date: 2019/07/23

Reference Information

CVE: CVE-2019-12815