First published: Thu Sep 25 2008(Updated: )
ftpd in OpenBSD 4.3, FreeBSD 7.0, NetBSD 4.0, Solaris, and possibly other operating systems interprets long commands from an FTP client as multiple commands, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks and execute arbitrary FTP commands via a long ftp:// URI that leverages an existing session from the FTP client implementation in a web browser.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD Kernel | =7.0 | |
NetBSD current | =4.0 | |
OpenBSD | =4.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-4247 is considered a medium severity vulnerability due to its potential for cross-site request forgery (CSRF) attacks.
To remediate CVE-2008-4247, users should update to a fixed version of the affected software, such as OpenBSD 4.3 or FreeBSD 7.0 that address this issue.
CVE-2008-4247 affects OpenBSD 4.3, FreeBSD 7.0, NetBSD 4.0, Solaris, and possibly other operating systems using vulnerable FTP daemons.
CVE-2008-4247 allows remote attackers to conduct cross-site request forgery (CSRF) attacks by manipulating long FTP commands.
While CVE-2008-4247 primarily impacts older versions of FTP servers, any legacy systems still running these configurations may still be vulnerable.