Debian DSA-1689-1 : proftpd-dfsg - missing input validation

medium Nessus Plugin ID 35252

Synopsis

The remote Debian host is missing a security-related update.

Description

Maksymilian Arciemowicz of securityreason.com reported that ProFTPD is vulnerable to cross-site request forgery (CSRF) attacks and executes arbitrary FTP commands via a long ftp:// URI that leverages an existing session from the FTP client implementation in a web browser.

Solution

Upgrade the proftpd-dfsg package.

For the stable distribution (etch) this problem has been fixed in version 1.3.0-19etch2 and in version 1.3.1-15~bpo40+1 for backports.

See Also

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=502674

https://www.debian.org/security/2008/dsa-1689

Plugin Details

Severity: Medium

ID: 35252

File Name: debian_DSA-1689.nasl

Version: 1.14

Type: local

Agent: unix

Published: 12/22/2008

Updated: 1/4/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.6

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:proftpd-dfsg, cpe:/o:debian:debian_linux:4.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 12/21/2008

Reference Information

CVE: CVE-2008-4242

BID: 31289

CWE: 352

DSA: 1689