Vulnerability CVE-2017-15272


Published: 2017-11-15

Description:
The PSFTPd 10.0.4 Build 729 server stores its configuration inside PSFTPd.dat. This file is a Microsoft Access Database and can be extracted. The application sets the encrypt flag with the password "ITsILLEGAL"; however, this password is not required to extract the data. Cleartext is used for a user password.

See advisories in our WLB2 database:
Topic
Author
Date
High
PSFTPd Windows FTP Server 10.0.4 Build 729 Log Injection / Use-After-Free
X41 D-Sec
15.11.2017

Type:

CWE-522

(Insufficiently Protected Credentials)

CVSS2 => (AV:L/AC:L/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
2.1/10
2.9/10
3.9/10
Exploit range
Attack complexity
Authentication
Local
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Psftp -> Psftpd 

 References:
http://packetstormsecurity.com/files/144972/PSFTPd-Windows-FTP-Server-10.0.4-Build-729-Use-After-Free-Log-Injection.html
http://www.securityfocus.com/archive/1/541518/100/0/threaded
https://www.x41-dsec.de/lab/advisories/x41-2017-006-psftpd/

Copyright 2024, cxsecurity.com

 

Back to Top