header-logo
Suggest Exploit
vendor:
Pablo FTP Service
by:
SecurityFocus
7.5
CVSS
HIGH
Plaintext Password Storage
259
CWE
Product Name: Pablo FTP Service
Affected Version From: 1.2
Affected Version To: 1.2
Patch Exists: YES
Related CWE: N/A
CPE: //a:pablo_ftp_service
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2002

Pablo FTP Service Plaintext Password Storage Vulnerability

It has been reported that Pablo FTP Service stores FTP User account passwords in plaintext format. As a result, these credentials could be exposed to other users. It should be noted that while this weakness has been reported to affect Pablo FTP service version 1.2, other versions might also be affected.

Mitigation:

Ensure that passwords are stored in an encrypted format.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/7801/info

It has been reported that Pablo FTP Service stores FTP User account passwords in plaintext format. As a result, these credentials could be exposed to other users.

It should be noted that while this weakness has been reported to affect Pablo FTP service version 1.2, other versions might also be affected. 

ftp://www.example.com/program files/pablo's ftp service/users.dat