7.5
CVSSv2

CVE-2008-4247

Published: 25/09/2008 Updated: 23/10/2012
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

ftpd in OpenBSD 4.3, FreeBSD 7.0, NetBSD 4.0, Solaris, and possibly other operating systems interprets long commands from an FTP client as multiple commands, which allows remote malicious users to conduct cross-site request forgery (CSRF) attacks and execute arbitrary FTP commands via a long ftp:// URI that leverages an existing session from the FTP client implementation in a web browser.

Vulnerable Product Search on Vulmon Subscribe to Product

openbsd openbsd 4.3

freebsd freebsd 7.0

netbsd netbsd 4.0

Vendor Advisories

Debian Bug report logs - #500278 ftpd: command line split (CSRF) Package: ftpd; Maintainer for ftpd is Mats Erik Andersson <matsandersson@gisladiskerse>; Source for ftpd is src:linux-ftpd (PTS, buildd, popcon) Reported by: Paul Szabo <psz@mathsusydeduau> Date: Fri, 26 Sep 2008 20:42:01 UTC Severity: grave Tags: ...

Exploits

source: wwwsecurityfocuscom/bid/31289/info FTP servers by multiple vendors are prone to a security vulnerability that allows attackers to perform cross-site request-forgery attacks Successful exploits can run arbitrary FTP commands on the server in the context of an unsuspecting user's session This may lead to further attacks ftp:// ...