First published: Fri Dec 19 2008(Updated: )
Ipswitch WS_FTP Server Manager before 6.1.1, and possibly other Ipswitch products, allows remote attackers to bypass authentication and read logs via a logLogout action to FTPLogServer/login.asp followed by a request to FTPLogServer/LogViewer.asp with the localhostnull account name.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ipswitch Ws Ftp | =3.1.1 | |
Ipswitch Ws Ftp | =2.01 | |
Ipswitch Ws Ftp | <=6.1 | |
Ipswitch Ws Ftp | =3.1.0 | |
Ipswitch Ws Ftp | =5.00 | |
Ipswitch Ws Ftp | =5.03 | |
Ipswitch Ws Ftp | =3.1.3 | |
Ipswitch Ws Ftp | =2.02 | |
Ipswitch Ws Ftp | =4.01 | |
Ipswitch Ws Ftp | =6.0 | |
Ipswitch Ws Ftp | =2.03 | |
Ipswitch Ws Ftp | =3.0 | |
Ipswitch Ws Ftp | =5.02 | |
Ipswitch Ws Ftp | =1.0.5 | |
Ipswitch Ws Ftp | =4.00 | |
Ipswitch Ws Ftp | =5.05 | |
Ipswitch Ws Ftp | =5.01 | |
Ipswitch Ws Ftp | =5.04 | |
Ipswitch Ws Ftp | =3.0.1 | |
Ipswitch Ws Ftp | =3.14 | |
Ipswitch Ws Ftp | =4.02 | |
Ipswitch Ws Ftp | =3.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.