Plugin ID | 297 |
Plugin name | ftpd cwd user detection |
Plugin filename | ftpd cwd user detection.plugin |
Plugin filesize | 2138 bytes |
Plugin family | FTP |
Plugin created name | Marc Ruef |
Plugin created email | marc.ruef at computec.ch |
Plugin created web | http://www.computec.ch |
Plugin created company | computec.ch |
Plugin created date | 2005/01/04 |
Plugin version | 1.0 |
Plugin protocol | tcp |
Plugin port | 21 |
Plugin procedure exploit | open|sleep|send anonymous\n|sleep|send atk@test.example\n|sleep|send CWD ~root\n|sleep|send QUIT\n|close|pattern_exists 550 / |
Plugin exploit accuracy | 90 |
Plugin comment | The NASL script is Copyright (C) 1999 Renaud Deraison |
Bug vulnerability class | Configuration |
Bug description | It is possible to determine the existence of a user on the remote system by issuing the command CWD ~<username>, like : "CWD ~root". An attacker may use this to determine the existence of known to be vulnerable accounts (like guest) or to determine which system you are running. |
Bug solution | Inform your vendor, and ask for a patch, or change your FTP server. |
Bug fixing time | Approx. 2 hours |
Bug exploit availability | Yes |
Bug remote | Yes |
Bug local | Yes |
Bug severity | Medium |
Bug popularity | 6 |
Bug simplicity | 7 |
Bug impact | 5 |
Bug risk | 6 |
Bug Nessus risk | Low |
Bug check tools | Nessus can check this flaw with the plugin 10082 (FTPd tells if a user exists). |
Source Nessus ID | 10082 |
Source Literature | Hacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray and George Kurtz, February 25, 2003, 4th Edition, McGraw-Hill Osborne Media, ISBN 0072227427 |
Source Misc. | http://www.computec.ch |