Vulnerabilities > CVE-2019-12815 - Improper Handling of Exceptional Conditions vulnerability in multiple products
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
An arbitrary file copy vulnerability in mod_copy in ProFTPD up to 1.3.5b allows for remote code execution and information disclosure without authentication, a related issue to CVE-2015-3306.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | Proftpd
| 79 |
OS | 2 | |
OS | 3 | |
OS | 3 | |
Hardware | 1 |
Common Weakness Enumeration (CWE)
Nessus
NASL family Debian Local Security Checks NASL id DEBIAN_DSA-4491.NASL description Tobias Maedel discovered that the mod_copy module of ProFTPD, a FTP/SFTP/FTPS server, performed incomplete permission validation for the CPFR/CPTO commands. last seen 2020-06-01 modified 2020-06-02 plugin id 127487 published 2019-08-12 reporter This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/127487 title Debian DSA-4491-1 : proftpd-dfsg - security update NASL family SuSE Local Security Checks NASL id OPENSUSE-2019-1836.NASL description This update for proftpd fixes the following issues : Security issues fixed : - CVE-2019-12815: Fixed arbitrary file copy in mod_copy that allowed for remote code execution and information disclosure without authentication (bnc#1142281). last seen 2020-06-01 modified 2020-06-02 plugin id 127741 published 2019-08-12 reporter This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/127741 title openSUSE Security Update : proftpd (openSUSE-2019-1836) NASL family SuSE Local Security Checks NASL id OPENSUSE-2020-31.NASL description This update for proftpd fixes the following issues : - GeoIP has been discontinued by Maxmind (boo#1156210) This update removes module build for geoip see https://support.maxmind.com/geolite-legacy-discontinuati on-notice/ - CVE-2019-19269: Fixed a NULL pointer dereference may occur when validating the certificate of a client connecting to the server (boo#1157803) - CVE-2019-19270: Fixed a Failure to check for the appropriate field of a CRL entry prevents some valid CRLs from being taken into account (boo#1157798) - CVE-2019-18217: Fixed remote unauthenticated denial-of-service due to incorrect handling of overly long commands (boo#1154600 gh#846) Update to 1.3.6b - Fixed pre-authentication remote denial-of-service issue (Issue #846). - Backported fix for building mod_sql_mysql using MySQL 8 (Issue #824). Update to 1.3.6a : - Fixed symlink navigation (Bug#4332). - Fixed building of mod_sftp using OpenSSL 1.1.x releases (Issue#674). - Fixed SITE COPY honoring of <Limit> restrictions (Bug#4372). - Fixed segfault on login when using mod_sftp + mod_sftp_pam (Issue#656). - Fixed restarts when using mod_facl as a static module - Add missing Requires(pre): group(ftp) for Leap 15 and Tumbleweed (boo#1155834) - Add missing Requires(pre): user(ftp) for Leap 15 and Tumbleweed (boo#1155834) - Use pam_keyinit.so (boo#1144056) - Reduce hard dependency on systemd to only that which is necessary for building and installation. update to 1.3.6 : - Support for using Redis for caching, logging; see the doc/howto/Redis.html documentation. - Fixed mod_sql_postgres SSL support (Issue #415). - Support building against LibreSSL instead of OpenSSL (Issue #361). - Better support on AIX for login restraictions (Bug #4285). - TimeoutLogin (and other timeouts) were not working properly for SFTP connections (Bug#4299). - Handling of the SIGILL and SIGINT signals, by the daemon process, now causes the child processes to be terminated as well (Issue #461). - RPM .spec file naming changed to conform to Fedora guidelines. - Fix for last seen 2020-06-01 modified 2020-06-02 plugin id 132911 published 2020-01-15 reporter This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/132911 title openSUSE Security Update : proftpd (openSUSE-2020-31) NASL family Fedora Local Security Checks NASL id FEDORA_2019-E9187610C3.NASL description This update addresses an arbitrary file copy vulnerability in mod_copy in ProFTPD, which allowed for remote code execution and information disclosure without authentication due to not honoring `<Limit>` constraints. Upstream bug: http://bugs.proftpd.org/show_bug.cgi?id=4372 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 127534 published 2019-08-12 reporter This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/127534 title Fedora 30 : proftpd (2019-e9187610c3) NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-201908-16.NASL description The remote host is affected by the vulnerability described in GLSA-201908-16 (ProFTPD: Remote code execution) It was discovered that ProFTPD’s “mod_copy” module does not properly restrict privileges for anonymous users. Impact : A remote attacker, by anonymously uploading a malicious file, could possibly execute arbitrary code with the privileges of the process, cause a Denial of Service condition or disclose information. Workaround : There is no known workaround at this time. last seen 2020-06-01 modified 2020-06-02 plugin id 127965 published 2019-08-20 reporter This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/127965 title GLSA-201908-16 : ProFTPD: Remote code execution NASL family Fedora Local Security Checks NASL id FEDORA_2019-82B0F48691.NASL description This update addresses an arbitrary file copy vulnerability in mod_copy in ProFTPD, which allowed for remote code execution and information disclosure without authentication due to not honoring `<Limit>` constraints. Upstream bug: http://bugs.proftpd.org/show_bug.cgi?id=4372 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 127519 published 2019-08-12 reporter This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/127519 title Fedora 29 : proftpd (2019-82b0f48691) NASL family FTP NASL id PROFTPD_MOD_COPY.NASL description The remote host is running ProFTPD. It is affected by a vulnerability in the mod_copy module which fails to honor <Limit READ> and <Limit WRITE> configurations as expected. An unauthenticated, remote attacker can exploit this, by using the mod_copy module last seen 2020-06-01 modified 2020-06-02 plugin id 132749 published 2020-01-09 reporter This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/132749 title ProFTPD 'mod_copy' Arbitrary File Copy Vulnerability (Remote) NASL family Debian Local Security Checks NASL id DEBIAN_DLA-1873.NASL description Tobias Maedel discovered that the mod_copy module of ProFTPD, a FTP/SFTP/FTPS server, performed incomplete permission validation for the CPFR/CPTO commands. For Debian 8 last seen 2020-06-01 modified 2020-06-02 plugin id 127482 published 2019-08-12 reporter This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/127482 title Debian DLA-1873-1 : proftpd-dfsg security update
The Hacker News
id | THN:AB717FBC8FF7C7C1D194A126C788DF50 |
last seen | 2019-07-23 |
modified | 2019-07-23 |
published | 2019-07-23 |
reporter | The Hacker News |
source | https://thehackernews.com/2019/07/linux-ftp-server-security.html |
title | A New 'Arbitrary File Copy' Flaw Affects ProFTPD Powered FTP Servers |
References
- http://bugs.proftpd.org/show_bug.cgi?id=4372
- http://bugs.proftpd.org/show_bug.cgi?id=4372
- http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00009.html
- http://www.securityfocus.com/bid/109339
- http://www.securityfocus.com/bid/109339
- https://cert-portal.siemens.com/productcert/pdf/ssa-940889.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-940889.pdf
- https://github.com/proftpd/proftpd/pull/816
- https://github.com/proftpd/proftpd/pull/816
- https://lists.debian.org/debian-lts-announce/2019/08/msg00006.html
- https://lists.debian.org/debian-lts-announce/2019/08/msg00006.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OJDQ3XUYWO42TJBO53NUWDZRA35QMVEI/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OJDQ3XUYWO42TJBO53NUWDZRA35QMVEI/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XM5FPBAGSIKV6YJZEPM6GPGJO5JFT7XU/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XM5FPBAGSIKV6YJZEPM6GPGJO5JFT7XU/
- https://seclists.org/bugtraq/2019/Aug/3
- https://seclists.org/bugtraq/2019/Aug/3
- https://security.gentoo.org/glsa/201908-16
- https://security.gentoo.org/glsa/201908-16
- https://tbspace.de/cve201912815proftpd.html
- https://tbspace.de/cve201912815proftpd.html
- https://www.debian.org/security/2019/dsa-4491
- https://www.debian.org/security/2019/dsa-4491