Language:
https://seclists.org/fulldisclosure/2010/Aug/132
Severity: High
ID: 63223
File Name: freeftpd_sftp_auth_bypass.nasl
Version: 1.17
Type: remote
Family: Gain a shell remotely
Published: 12/11/2012
Updated: 6/12/2020
Supported Sensors: Nessus
Risk Factor: High
Score: 7.4
Risk Factor: Critical
Base Score: 10
Temporal Score: 9.5
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2012-6067
Risk Factor: High
Base Score: 7.3
Temporal Score: 7.1
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Temporal Vector: CVSS:3.0/E:F/RL:U/RC:C
CPE: cpe:/a:freeftpd:freeftpd, cpe:/a:freesshd:freesshd
Excluded KB Items: global_settings/supplied_logins_only
Exploit Available: true
Exploit Ease: Exploits are available
Exploited by Nessus: true
Vulnerability Publication Date: 8/11/2010
Core Impact
Metasploit (Freesshd Authentication Bypass)
CVE: CVE-2012-6066, CVE-2012-6067