Vulnerabilities > CVE-2003-0500 - Unspecified vulnerability in Proftpd Project Proftpd 1.2.9Rc1

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
proftpd-project
nessus
exploit available

Summary

SQL injection vulnerability in the PostgreSQL authentication module (mod_sql_postgres) for ProFTPD before 1.2.9rc1 allows remote attackers to execute arbitrary SQL and gain privileges by bypassing authentication or stealing passwords via the USER name.

Vulnerable Configurations

Part Description Count
Application
Proftpd_Project
1

Exploit-Db

descriptionProFTPD 1.2.9RC1 (mod_sql) Remote SQL Injection Exploit. CVE-2003-0500. Remote exploit for linux platform
idEDB-ID:43
last seen2016-01-31
modified2003-06-19
published2003-06-19
reporterSpaine
sourcehttps://www.exploit-db.com/download/43/
titleProFTPD 1.2.9RC1 - mod_sql Remote SQL Injection Exploit

Nessus

  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-338.NASL
    descriptionrunlevel [[email protected]] reported that ProFTPD
    last seen2020-06-01
    modified2020-06-02
    plugin id15175
    published2004-09-29
    reporterThis script is Copyright (C) 2004-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/15175
    titleDebian DSA-338-1 : proftpd - SQL injection
    code
    #%NASL_MIN_LEVEL 80502
    
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Debian Security Advisory DSA-338. The text 
    # itself is copyright (C) Software in the Public Interest, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(15175);
      script_version("1.20");
      script_cvs_date("Date: 2019/08/02 13:32:17");
    
      script_cve_id("CVE-2003-0500");
      script_bugtraq_id(7974);
      script_xref(name:"DSA", value:"338");
    
      script_name(english:"Debian DSA-338-1 : proftpd - SQL injection");
      script_summary(english:"Checks dpkg output for the updated package");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Debian host is missing a security-related update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "runlevel [[email protected]] reported that ProFTPD's PostgreSQL
    authentication module is vulnerable to a SQL injection attack. This
    vulnerability could be exploited by a remote, unauthenticated attacker
    to execute arbitrary SQL statements, potentially exposing the
    passwords of other users, or to connect to ProFTPD as an arbitrary
    user without supplying the correct password."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.debian.org/security/2003/dsa-338"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "For the stable distribution (woody) this problem has been fixed in
    version 1.2.4+1.2.5rc1-5woody2.
    
    We recommend that you update your proftpd package."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:proftpd");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:3.0");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2003/06/29");
      script_set_attribute(attribute:"plugin_publication_date", value:"2004/09/29");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2004-2019 Tenable Network Security, Inc.");
      script_family(english:"Debian Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("debian_package.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
    if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    if (deb_check(release:"3.0", prefix:"proftpd", reference:"1.2.4+1.2.5rc1-5woody2")) flag++;
    if (deb_check(release:"3.0", prefix:"proftpd-common", reference:"1.2.4+1.2.5rc1-5woody2")) flag++;
    if (deb_check(release:"3.0", prefix:"proftpd-doc", reference:"1.2.4+1.2.5rc1-5woody2")) flag++;
    if (deb_check(release:"3.0", prefix:"proftpd-ldap", reference:"1.2.4+1.2.5rc1-5woody2")) flag++;
    if (deb_check(release:"3.0", prefix:"proftpd-mysql", reference:"1.2.4+1.2.5rc1-5woody2")) flag++;
    if (deb_check(release:"3.0", prefix:"proftpd-pgsql", reference:"1.2.4+1.2.5rc1-5woody2")) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());
      else security_hole(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyFTP
    NASL idPROFTPD_PGSQL_INSERTION.NASL
    descriptionThe remote FTP server is vulnerable to a SQL injection when it processes the USER command. An attacker may exploit this flaw to log into the remote host as any user.
    last seen2020-06-01
    modified2020-06-02
    plugin id11768
    published2003-06-19
    reporterThis script is Copyright (C) 2003-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/11768
    titlePostgreSQL Authentication Module (mod_sql) for ProFTPD USER Name Parameter SQL Injection
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
     script_id(11768);
     script_version("1.21");
     script_cvs_date("Date: 2018/07/25 18:58:04");
    
     script_cve_id("CVE-2003-0500");
     script_bugtraq_id(7974);
     
     script_name(english:"PostgreSQL Authentication Module (mod_sql) for ProFTPD USER Name Parameter SQL Injection");
     script_summary(english:"Performs a SQL insertion");
    
     script_set_attribute(attribute:"synopsis", value:
    "It may be possible to read or modify arbitrary files on the remote
    server.");
     script_set_attribute(attribute:"description", value:
    "The remote FTP server is vulnerable to a SQL injection when it
    processes the USER command. 
    
    An attacker may exploit this flaw to log into the remote host as any
    user.");
     script_set_attribute(attribute:"solution", value:
    "If the remote server is ProFTPd, upgrade to ProFTPD 1.2.10.");
     script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
     script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
     script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
     script_set_attribute(attribute:"exploit_available", value:"true");
    
     script_set_attribute(attribute:"plugin_publication_date", value:"2003/06/19");
     script_set_attribute(attribute:"vuln_publication_date", value:"2003/06/18");
    
     script_set_attribute(attribute:"plugin_type", value:"remote");
     script_set_attribute(attribute:"cpe", value:"cpe:/a:proftpd:proftpd");
     script_end_attributes();
    
     script_category(ACT_GATHER_INFO);
     script_family(english:"FTP");
    
     script_copyright(english:"This script is Copyright (C) 2003-2018 Tenable Network Security, Inc.");
    
     script_dependencie("ftpserver_detect_type_nd_version.nasl");
     script_require_keys("ftp/proftpd");
     script_require_ports("Services/ftp", 21);
     exit(0);
    }
    
    #
    # The script code starts here : 
    #
    
    include("global_settings.inc");
    include("misc_func.inc");
    include("ftp_func.inc");
    
    if (report_paranoia < 1) exit(0, "This script is prone to False Positive.");
    
    port = get_ftp_port(default: 21);
    
    banner = get_ftp_banner(port:port);
    if( ! banner)
     exit(1, "No FTP banner on port "+port);
    if ("ProFTPD" >!< banner)
     exit(0, "The FTP server on port "+port+" is not ProFTPD.");
    
    soc = open_sock_tcp(port);
    if(!soc)exit(1, "Connection refused on port "+port);
    
    banner = ftp_recv_line(socket:soc);
    if (! banner || ! egrep(pattern:"^220.*proftp", string:banner, icase:TRUE) )
    {
     close(soc);
     exit(1, "Could not read welcome message on port "+port);
    }
    
    send(socket:soc, data:'USER "\r\n');
    r = recv_line(socket:soc, length:4096);
    close(soc);
    if(!r) exit(1, "No answer to bogus USER command on port "+port);
    
    soc = open_sock_tcp(port);
    if(!soc)exit(1, "Connection refused on port "+port);
    # The following causes a syntax error and makes the FTP
    # daemon close the session
    banner = ftp_recv_line(socket:soc);
    if(!banner)
    {
      close(soc);
      exit(1, "Could not read FTP banner on port "+port);
    }
    send(socket:soc, data: 'USER \'\r\n');
    r = recv_line(socket:soc, length:4096, timeout: 3 * get_read_timeout());
    if(!r)
    {
     security_hole(port);
     set_kb_item(name: 'www/'+port+'/SQLInjection', value: TRUE);
    }
    close(soc);