ID

VAR-200812-0134


CVE

CVE-2008-5692


TITLE

Ipswitch WS_FTP Server Manager Vulnerable to read logs

Trust: 0.8

sources: JVNDB: JVNDB-2008-005194

DESCRIPTION

Ipswitch WS_FTP Server Manager before 6.1.1, and possibly other Ipswitch products, allows remote attackers to bypass authentication and read logs via a logLogout action to FTPLogServer/login.asp followed by a request to FTPLogServer/LogViewer.asp with the localhostnull account name. WS_FTP Server Manager is prone to an authentication-bypass vulnerability and an information-disclosure vulnerability. An attacker can exploit these issues to gain unauthorized access to the affected application and gain access to potentially sensitive information. These issues affect WS_FTP Server Manager 6.1.0.0; prior versions may also be affected. Ipswitch WS_FTP Server is a highly secure and easy-to-manage file transfer server. ---------------------------------------------------------------------- A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched. Download and test it today: https://psi.secunia.com/ Read more about this new version: https://psi.secunia.com/?page=changelog ---------------------------------------------------------------------- TITLE: IPSwitch WS_FTP Server Manager Security Bypass SECUNIA ADVISORY ID: SA28822 VERIFY ADVISORY: http://secunia.com/advisories/28822/ CRITICAL: Moderately critical IMPACT: Security Bypass, Exposure of sensitive information WHERE: >From remote SOFTWARE: WS_FTP Server 6.x http://secunia.com/product/14782/ DESCRIPTION: Luigi Auriemma has discovered a security issue in IPSwitch WS_FTP Server, which can be exploited by malicious people to bypass certain access restrictions and disclose sensitive information. The security issue is caused due to an error within the WS_FTP Server Manager when processing HTTP requests for the FTPLogServer/LogViewer.asp script. This can be exploited to gain access to the log viewing interface by e.g. logging out and directly accessing the FTPLogServer/LogViewer.asp script. SOLUTION: Restrict access to trusted users only. PROVIDED AND/OR DISCOVERED BY: Luigi Auriemma ORIGINAL ADVISORY: http://aluigi.altervista.org/adv/wsftpweblog-adv.txt ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2008-5692 // JVNDB: JVNDB-2008-005194 // BID: 27654 // VULHUB: VHN-35817 // PACKETSTORM: 63375

AFFECTED PRODUCTS

vendor:ipswitchmodel:ws ftpscope:eqversion:3.1.1

Trust: 1.6

vendor:ipswitchmodel:ws ftpscope:eqversion:3.1.2

Trust: 1.6

vendor:ipswitchmodel:ws ftpscope:eqversion:5.01

Trust: 1.6

vendor:ipswitchmodel:ws ftpscope:eqversion:6.0

Trust: 1.6

vendor:ipswitchmodel:ws ftpscope:eqversion:3.0.1

Trust: 1.6

vendor:ipswitchmodel:ws ftpscope:eqversion:2.01

Trust: 1.6

vendor:ipswitchmodel:ws ftpscope:eqversion:3.1.3

Trust: 1.6

vendor:ipswitchmodel:ws ftpscope:eqversion:3.0

Trust: 1.6

vendor:ipswitchmodel:ws ftpscope:eqversion:3.14

Trust: 1.6

vendor:ipswitchmodel:ws ftpscope:eqversion:2.03

Trust: 1.6

vendor:ipswitchmodel:ws ftpscope:lteversion:6.1

Trust: 1.0

vendor:ipswitchmodel:ws ftpscope:eqversion:4.02

Trust: 1.0

vendor:ipswitchmodel:ws ftpscope:eqversion:5.00

Trust: 1.0

vendor:ipswitchmodel:ws ftpscope:eqversion:5.05

Trust: 1.0

vendor:ipswitchmodel:ws ftpscope:eqversion:5.04

Trust: 1.0

vendor:ipswitchmodel:ws ftpscope:eqversion:1.0.5

Trust: 1.0

vendor:ipswitchmodel:ws ftpscope:eqversion:4.00

Trust: 1.0

vendor:ipswitchmodel:ws ftpscope:eqversion:5.03

Trust: 1.0

vendor:ipswitchmodel:ws ftpscope:eqversion:2.02

Trust: 1.0

vendor:ipswitchmodel:ws ftpscope:eqversion:4.01

Trust: 1.0

vendor:ipswitchmodel:ws ftpscope:eqversion:3.1.0

Trust: 1.0

vendor:ipswitchmodel:ws ftpscope:eqversion:5.02

Trust: 1.0

vendor:ipswitchmodel:ws ftpscope:ltversion:server manager 6.1.1

Trust: 0.8

vendor:ipswitchmodel:ws ftp server managerscope:eqversion:6.1.0.0

Trust: 0.3

vendor:ipswitchmodel:ws ftp serverscope:eqversion:6.1.0

Trust: 0.3

vendor:ipswitchmodel:ws ftp serverscope:eqversion:6.0

Trust: 0.3

vendor:ipswitchmodel:ws ftp serverscope:neversion:6.1.1

Trust: 0.3

vendor:ipswitchmodel:ws ftp serverscope:neversion:7.1

Trust: 0.3

sources: BID: 27654 // JVNDB: JVNDB-2008-005194 // CNNVD: CNNVD-200812-405 // NVD: CVE-2008-5692

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-5692
value: MEDIUM

Trust: 1.0

NVD: CVE-2008-5692
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200812-405
value: MEDIUM

Trust: 0.6

VULHUB: VHN-35817
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2008-5692
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-35817
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-35817 // JVNDB: JVNDB-2008-005194 // CNNVD: CNNVD-200812-405 // NVD: CVE-2008-5692

PROBLEMTYPE DATA

problemtype:CWE-287

Trust: 1.9

sources: VULHUB: VHN-35817 // JVNDB: JVNDB-2008-005194 // NVD: CVE-2008-5692

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200812-405

TYPE

authorization issue

Trust: 0.6

sources: CNNVD: CNNVD-200812-405

CONFIGURATIONS

sources: JVNDB: JVNDB-2008-005194

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-35817

PATCH

title:Fixed in 6.1.1url:http://docs.ipswitch.com/WS_FTP_Server611/ReleaseNotes/index.htm?k_id=ipswitch_ftp_documents_worldwide_ws_ftpserverv611releasenotes#link12

Trust: 0.8

sources: JVNDB: JVNDB-2008-005194

EXTERNAL IDS

db:NVDid:CVE-2008-5692

Trust: 2.8

db:BIDid:27654

Trust: 2.0

db:SECUNIAid:28822

Trust: 1.8

db:VUPENid:ADV-2008-0473

Trust: 1.7

db:SREASONid:4799

Trust: 1.7

db:JVNDBid:JVNDB-2008-005194

Trust: 0.8

db:BUGTRAQid:20080206 RE: LOGS VISUALIZATION IN WS_FTP SERVER MANAGER 6.1.0.0

Trust: 0.6

db:BUGTRAQid:20080206 LOGS VISUALIZATION IN WS_FTP SERVER MANAGER 6.1.0.0

Trust: 0.6

db:CNNVDid:CNNVD-200812-405

Trust: 0.6

db:SEEBUGid:SSVID-84469

Trust: 0.1

db:EXPLOIT-DBid:31117

Trust: 0.1

db:VULHUBid:VHN-35817

Trust: 0.1

db:PACKETSTORMid:63375

Trust: 0.1

sources: VULHUB: VHN-35817 // BID: 27654 // JVNDB: JVNDB-2008-005194 // PACKETSTORM: 63375 // CNNVD: CNNVD-200812-405 // NVD: CVE-2008-5692

REFERENCES

url:http://aluigi.altervista.org/adv/wsftpweblog-adv.txt

Trust: 1.8

url:http://www.securityfocus.com/bid/27654

Trust: 1.7

url:http://docs.ipswitch.com/ws_ftp_server611/releasenotes/index.htm?k_id=ipswitch_ftp_documents_worldwide_ws_ftpserverv611releasenotes#link12

Trust: 1.7

url:http://secunia.com/advisories/28822

Trust: 1.7

url:http://securityreason.com/securityalert/4799

Trust: 1.7

url:http://www.securityfocus.com/archive/1/487686/100/200/threaded

Trust: 1.1

url:http://www.securityfocus.com/archive/1/487697/100/200/threaded

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/0473

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-5692

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-5692

Trust: 0.8

url:http://www.securityfocus.com/archive/1/archive/1/487697/100/200/threaded

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/487686/100/200/threaded

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2008/0473

Trust: 0.6

url:http://www.ipswitch.com/products/ws_ftp/home/index.asp

Trust: 0.3

url:/archive/1/487682

Trust: 0.3

url:http://www.ipswitchft.com/support/ws_ftp_server/releases/wr611.asp

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:https://psi.secunia.com/?page=changelog

Trust: 0.1

url:https://psi.secunia.com/

Trust: 0.1

url:http://secunia.com/product/14782/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/28822/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-35817 // BID: 27654 // JVNDB: JVNDB-2008-005194 // PACKETSTORM: 63375 // CNNVD: CNNVD-200812-405 // NVD: CVE-2008-5692

CREDITS

Luigi Auriemma is credited with the discovery of these vulnerabilities.

Trust: 0.3

sources: BID: 27654

SOURCES

db:VULHUBid:VHN-35817
db:BIDid:27654
db:JVNDBid:JVNDB-2008-005194
db:PACKETSTORMid:63375
db:CNNVDid:CNNVD-200812-405
db:NVDid:CVE-2008-5692

LAST UPDATE DATE

2025-04-10T22:56:54.195000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-35817date:2018-10-11T00:00:00
db:BIDid:27654date:2016-07-06T14:17:00
db:JVNDBid:JVNDB-2008-005194date:2012-09-25T00:00:00
db:CNNVDid:CNNVD-200812-405date:2009-01-29T00:00:00
db:NVDid:CVE-2008-5692date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-35817date:2008-12-19T00:00:00
db:BIDid:27654date:2008-02-06T00:00:00
db:JVNDBid:JVNDB-2008-005194date:2012-09-25T00:00:00
db:PACKETSTORMid:63375date:2008-02-08T01:19:15
db:CNNVDid:CNNVD-200812-405date:2008-12-19T00:00:00
db:NVDid:CVE-2008-5692date:2008-12-19T18:30:00.407