ProFTPD 1.3.1 interprets long commands from an FTP client as multiple commands, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks and execute arbitrary FTP commands via a long ftp:// URI that leverages an existing session from the FTP client implementation in a web browser.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/31289 | vdb entry exploit |
http://securityreason.com/achievement_securityalert/56 | third party advisory |
http://www.mandriva.com/security/advisories?name=MDVSA-2009:061 | vendor advisory |
http://www.securitytracker.com/id?1020945 | vdb entry |
http://secunia.com/advisories/31930 | third party advisory vendor advisory |
https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00245.html | vendor advisory |
http://secunia.com/advisories/33261 | third party advisory |
http://secunia.com/advisories/33413 | third party advisory |
http://securityreason.com/securityalert/4313 | third party advisory |
https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00078.html | vendor advisory |
http://www.debian.org/security/2008/dsa-1689 | vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/45274 | vdb entry |
http://bugs.proftpd.org/show_bug.cgi?id=3115 |