First published: Thu Sep 25 2008(Updated: )
ProFTPD 1.3.1 interprets long commands from an FTP client as multiple commands, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks and execute arbitrary FTP commands via a long ftp:// URI that leverages an existing session from the FTP client implementation in a web browser.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ProFTPD | =1.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-4242 is considered to have a moderate severity, as it allows for potential cross-site request forgery (CSRF) attacks.
To fix CVE-2008-4242, upgrade to a patched version of ProFTPD that addresses this vulnerability.
CVE-2008-4242 specifically affects ProFTPD version 1.3.1.
CVE-2008-4242 can be exploited to execute arbitrary FTP commands remotely via crafted long commands.
Yes, there are known methods to exploit CVE-2008-4242 through long ftp:// URIs that can conduct CSRF attacks.