Cyberduck before 4.4.4 on Windows does not properly validate X.509 certificate chains, which allows man-in-the-middle attackers to spoof FTP-SSL servers via a certificate issued by an arbitrary root Certification Authority.
The product does not validate, or incorrectly validates, a certificate.
Link | Tags |
---|---|
https://cyberduck.io/changelog/ | issue tracking release notes vendor advisory |
http://www.securityfocus.com/archive/1/532039/100/0/threaded | mailing list exploit vdb entry third party advisory |
http://secunia.com/advisories/58426 | issue tracking permissions required third party advisory |