vendor:
ProFTPD
by:
Tymm Twillman
7.5
CVSS
HIGH
Remote Root Vulnerability
20
CWE
Product Name: ProFTPD
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux, Mac, Windows
2002
Lack of user input validation in ProFTPD
On systems that support it ProFTPD will attempt to modify the name of the program being executed (argv[0]) to display the command being executed by the logged on user. It does this by using snprintf to copy the input of the user into a buffer. Since proftpd will pass on user input data to snprintf, argument attacks are easy. Logging in as an anonymous user, you are still restricted as to some of the things you can do. But with a local login, root compromise at this point is trivial. And it is possible to modify this exploit for other systems, and for remote attacks.
Mitigation:
User input validation should be implemented to prevent malicious user input from being passed to snprintf.