Ipswitch WS_FTP Server Manager before 6.1.1, and possibly other Ipswitch products, allows remote attackers to bypass authentication and read logs via a logLogout action to FTPLogServer/login.asp followed by a request to FTPLogServer/LogViewer.asp with the localhostnull account name.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:54
Type | Values Removed | Values Added |
---|---|---|
References | () http://aluigi.altervista.org/adv/wsftpweblog-adv.txt - | |
References | () http://docs.ipswitch.com/WS_FTP_Server611/ReleaseNotes/index.htm?k_id=ipswitch_ftp_documents_worldwide_ws_ftpserverv611releasenotes#link12 - | |
References | () http://secunia.com/advisories/28822 - | |
References | () http://securityreason.com/securityalert/4799 - | |
References | () http://www.securityfocus.com/archive/1/487686/100/200/threaded - | |
References | () http://www.securityfocus.com/archive/1/487697/100/200/threaded - | |
References | () http://www.securityfocus.com/bid/27654 - | |
References | () http://www.vupen.com/english/advisories/2008/0473 - |
Information
Published : 2008-12-19 18:30
Updated : 2024-11-21 00:54
NVD link : CVE-2008-5692
Mitre link : CVE-2008-5692
CVE.ORG link : CVE-2008-5692
JSON object : View
Products Affected
ipswitch
- ws_ftp
CWE
CWE-287
Improper Authentication