[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96174

 
 

909

 
 

78077

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2008-4242

Date: (C)2008-09-25   (M)2017-08-08
 
CVSS Score: 6.8Access Vector: NETWORK
Exploitability Subscore: 8.6Access Complexity: MEDIUM
Impact Subscore: 6.4Authentication: NONE
 Confidentiality: PARTIAL
 Integrity: PARTIAL
 Availability: PARTIAL











ProFTPD 1.3.1 interprets long commands from an FTP client as multiple commands, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks and execute arbitrary FTP commands via a long ftp:// URI that leverages an existing session from the FTP client implementation in a web browser.

Reference:
SECTRACK-1020945
http://securityreason.com/achievement_securityalert/56
BID-31289
SECUNIA-31930
SECUNIA-33261
SECUNIA-33413
SREASON-4313
DSA-1689
FEDORA-2009-0064
FEDORA-2009-0195
MDVSA-2009:061
http://bugs.proftpd.org/show_bug.cgi?id=3115
proftpd-url-csrf(45274)

CWE    1
CWE-352
OVAL    4
oval:org.secpod.oval:def:101676
oval:org.secpod.oval:def:101547
oval:org.mitre.oval:def:7948
oval:org.secpod.oval:def:102297
...

© 2013 SecPod Technologies