Lucene search

K
openvasCopyright (C) 2000 A. de BernisOPENVAS:136141256231010452
HistoryNov 03, 2005 - 12:00 a.m.

wu-ftpd SITE EXEC vulnerability

2005-11-0300:00:00
Copyright (C) 2000 A. de Bernis
plugins.openvas.org
20

6.5 Medium

AI Score

Confidence

Low

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.97 High

EPSS

Percentile

99.7%

The remote FTP server does not properly sanitize the argument of
the SITE EXEC command.

# SPDX-FileCopyrightText: 2000 A. de Bernis
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/a:washington_university:wu-ftpd";

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.10452");
  script_version("2023-08-01T13:29:10+0000");
  script_tag(name:"last_modification", value:"2023-08-01 13:29:10 +0000 (Tue, 01 Aug 2023)");
  script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/1387");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/2240");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/726");
  script_xref(name:"IAVA", value:"2000-a-0004");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_cve_id("CVE-2000-0573", "CVE-1999-0997");
  script_name("wu-ftpd SITE EXEC vulnerability");
  script_category(ACT_GATHER_INFO);
  script_family("FTP");
  script_copyright("Copyright (C) 2000 A. de Bernis");
  script_dependencies("gb_wu-ftpd_detect.nasl");
  script_require_ports("Services/ftp", 21);
  script_mandatory_keys("wu-ftpd/installed");

  script_tag(name:"summary", value:"The remote FTP server does not properly sanitize the argument of
  the SITE EXEC command.");

  script_tag(name:"impact", value:"It may be possible for a remote attacker to gain root access.");

  script_tag(name:"solution", value:"Upgrade your wu-ftpd server (<= 2.6.0 are vulnerable)
  or disable any access from untrusted users (especially anonymous).");

  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"qod_type", value:"remote_banner_unreliable");

  exit(0);
}

include("version_func.inc");
include("host_details.inc");

if( ! port = get_app_port( cpe:CPE ) ) exit( 0 );
if( ! vers = get_app_version( cpe:CPE, port:port ) ) exit( 0 );

if( egrep( pattern:"^((1\..*)|(2\.[0-5]\..*)|(2\.6\.0))", string: vers ) ) {
  report = report_fixed_ver( installed_version:vers, fixed_version:"2.6.1" );
  security_message( port:port, data:report );
  exit( 0 );
}

exit( 99 );

6.5 Medium

AI Score

Confidence

Low

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.97 High

EPSS

Percentile

99.7%