Vulnerabilities > CVE-2003-0329 - Local Security vulnerability in Aclogic Cesarftp 0.99G

047910
CVSS 4.6 - MEDIUM
Attack vector
LOCAL
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
local
low complexity
aclogic
nessus

Summary

CesarFTP 0.99g stores user names and passwords in plaintext in the settings.ini file, which could allow local users to gain privileges.

Vulnerable Configurations

Part Description Count
Application
Aclogic
1

Nessus

  • NASL familyWindows
    NASL idCESARFTP_PASSWD.NASL
    descriptionThe remote host is running CesarFTP. Due to a design flaw in the program, the plaintext usernames and passwords of FTP users are stored in the file
    last seen2020-06-01
    modified2020-06-02
    plugin id11640
    published2003-05-20
    reporterThis script is Copyright (C) 2003-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/11640
    titleCesarFTP settings.ini Authentication Credential Plaintext Disclosure
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # Ref:
    #  From: "Andreas Constantinides" <[email protected]>
    #  To: <[email protected]>
    #  Subject: Plaintext Password in Settings.ini of CesarFTP
    #  Date: Tue, 20 May 2003 10:25:56 +0300
    
    
    include("compat.inc");
    
    
    if (description)
    {
     script_id(11640);
     script_version("1.20");
     script_cvs_date("Date: 2018/11/15 20:50:26");
     script_cve_id("CVE-2001-1336", "CVE-2003-0329");
    
    
     script_name(english:"CesarFTP settings.ini Authentication Credential Plaintext Disclosure");
     script_summary(english:"Determines the presence of CesarFTP's settings.ini");
    
     script_set_attribute(attribute:"synopsis", value:"The remote FTP server is storing unencrypted passwords on disk.");
     script_set_attribute(attribute:"description", value:
    "The remote host is running CesarFTP.
    
    Due to a design flaw in the program, the plaintext usernames and
    passwords of FTP users are stored in the file 'settings.ini'. Any user
    with an account on this host may read this file and use the password
    to connect to this FTP server.");
     script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/2001/May/248");
     script_set_attribute(
       attribute:"see_also",
       value:"https://seclists.org/bugtraq/2003/May/211"
     );
     script_set_attribute(attribute:"solution", value:"There is no known solution at this time.");
     script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N");
    
     script_set_attribute(attribute:"vuln_publication_date", value:"2001/05/28");
     script_set_attribute(attribute:"plugin_publication_date", value:"2003/05/20");
    
     script_set_attribute(attribute:"plugin_type", value:"local");
     script_set_attribute(attribute:"cpe", value:"cpe:/a:aclogic:cesarftp");
     script_end_attributes();
    
     script_category(ACT_GATHER_INFO);
     script_family(english:"Windows");
    
     script_copyright(english:"This script is Copyright (C) 2003-2018 Tenable Network Security, Inc.");
    
     script_dependencies("smb_hotfixes.nasl");
     script_require_keys("SMB/Registry/Enumerated");
     script_require_ports(139, 445);
     exit(0);
    }
    
    
    include("smb_func.inc");
    include("smb_hotfixes.inc");
    include("audit.inc");
    
    rootfile = hotfix_get_programfilesdir();
    if ( ! rootfile ) exit(0);
    
    share = ereg_replace(pattern:"^([A-Za-z]):.*", replace:"\1$", string:rootfile);
    exe =  ereg_replace(pattern:"^[A-Za-z]:(.*)", replace:"\1\CesarFTP\Settings.ini", string:rootfile);
    
    
    name 	=  kb_smb_name();
    login	=  kb_smb_login();
    pass  	=  kb_smb_password();
    domain 	=  kb_smb_domain();
    port    =  kb_smb_transport();
    
    
    
    
    if(! smb_session_init()) audit(AUDIT_FN_FAIL, 'smb_session_init');
    r = NetUseAdd(login:login, password:pass, domain:domain, share:share);
    if ( r != 1 ) exit(0);
    
    handle = CreateFile (file:exe, desired_access:GENERIC_READ, file_attributes:FILE_ATTRIBUTE_NORMAL,
                         share_mode:FILE_SHARE_READ, create_disposition:OPEN_EXISTING);
    if( ! isnull(handle) )
    {
     data = ReadFile(handle:handle, length:16384, offset:0);
     if('Password= "' >< data && 'Login= "' >< data) security_note(port);
     CloseFile(handle:handle);
    }
    
    NetUseDel();
    
    
  • NASL familyFTP
    NASL idCESARFTP_OVERFLOWS.NASL
    descriptionThe remote host is running CesarFTP, an FTP server for Windows systems. There are multiple flaws in this version of CesarFTP that could allow an attacker to execute arbitrary code on this host, or simply to disable this server remotely.
    last seen2020-06-01
    modified2020-06-02
    plugin id11755
    published2003-06-18
    reporterThis script is Copyright (C) 2003-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/11755
    titleCesarFTP Multiple Vulnerabilities (OF, File Access, more)