7.5
CVSSv2

CVE-2001-0550

Published: 30/11/2001 Updated: 03/05/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 760
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

wu-ftpd 2.6.1 allows remote malicious users to execute arbitrary commands via a "~{" argument to commands such as CWD, which is not properly handled by the glob function (ftpglob).

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

david madore ftpd-bsd 0.3.3

washington university wu-ftpd 2.5.0

washington university wu-ftpd 2.6.0

washington university wu-ftpd 2.6.1

david madore ftpd-bsd 0.3.2

Vendor Advisories

CORE ST reports that an exploit has been found for a bug in the wu-ftpd glob code (this is the code that handles filename wildcard expansion) Any logged in user (including anonymous FTP users) can exploit the bug to gain root privileges on the server This has been corrected in version 260-6 of the wu-ftpd package ...

Exploits

source: wwwsecurityfocuscom/bid/3581/info Wu-Ftpd is an FTP server based on the BSD 'ftpd' that is maintained by Washington University Wu-Ftpd allows clients to organize files for FTP actions based on "file globbing" patterns File globbing is also used by various shells The implementation of file globbing included in Wu-Ftpd contains ...
/* 7350wurm - x86/linux wu_ftpd remote root exploit * * TESO CONFIDENTIAL - SOURCE MATERIALS * * This is unpublished proprietary source code of TESO Security * * The contents of these coded instructions, statements and computer * programs may not be disclosed to third parties, copied or duplicated in * any form, in whole or in part, withou ...

Github Repositories

Reports on post-exploitation on honeypot exploiting vulnerable wu-ftpd (CVE-2001-0550)

Network and Filesystem Forensics Reports on post-exploitation on honeypot exploiting vulnerable wu-ftpd (CVE-2001-0550)