FTP Daemon Long Command XSRF

medium Nessus Plugin ID 47040

Synopsis

The remote FTP server is affected by a cross-site request forgery vulnerability.

Description

The version of FTP running on the remote host is affected by a cross-site request forgery vulnerability. Long file names are not processed properly, resulting in the execution of arbitrary commands.

If a user is logged into the FTP server via web browser, a remote attacker could exploit this by tricking them into requesting a maliciously crafted web page, resulting in the execution of arbitrary FTP commands.

Solution

There is no known solution at this time.

See Also

http://seclists.org/fulldisclosure/2010/May/282

https://cxsecurity.com/issue/WLB-2010050127

https://cxsecurity.com/issue/WLB-2008090066

Plugin Details

Severity: Medium

ID: 47040

File Name: solaris_ftpd_csrf.nasl

Version: 1.23

Type: remote

Family: FTP

Published: 6/17/2010

Updated: 1/15/2021

Supported Sensors: Nessus

Risk Information

CVSS Score Rationale: Score from a more in depth analysis done by tenable

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS Score Source: manual

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Vulnerability Information

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 5/21/2010

Reference Information

BID: 31289, 40320

Secunia: 39856