The PSFTPd 10.0.4 Build 729 server does not properly escape data before writing it into a Comma Separated Values (CSV) file. This can be used by attackers to hide data in the Graphical User Interface (GUI) view and create arbitrary entries to a certain extent. Special characters such as '"' and ',' and '\r' are not escaped and can be used to add new entries to the log.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://packetstormsecurity.com/files/144972/PSFTPd-Windows-FTP-Server-10.0.4-Build-729-Use-After-Free-Log-Injection.html | third party advisory vdb entry |
http://www.securityfocus.com/archive/1/541518/100/0/threaded | mailing list |
https://www.x41-dsec.de/lab/advisories/x41-2017-006-psftpd/ | third party advisory |
https://www.exploit-db.com/exploits/43144/ | third party advisory vdb entry exploit |