First published: Wed Jun 16 2010(Updated: )
auth_db_config.py in Pyftpd 0.8.4 contains hard-coded usernames and passwords for the (1) test, (2) user, and (3) roxon accounts, which allows remote attackers to read arbitrary files from the FTP server.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Debian Pyftpd | =0.8.4 | |
Pyftpdlib | =0.8.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-2073 is considered a high severity vulnerability due to its potential for remote exploitation that allows unauthorized access to FTP server files.
To fix CVE-2010-2073, upgrade Pyftpd to a version that no longer contains hard-coded credentials or implement access controls to restrict unauthorized access.
The implications of CVE-2010-2073 include the risk of unauthorized file access which can lead to data breaches and compromise of sensitive information.
CVE-2010-2073 affects hard-coded accounts including 'test', 'user', and 'roxon' which can be exploited by attackers.
CVE-2010-2073 is found in Pyftpd version 0.8.4.