Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-1999-0997Gmbh Anonftp vulnerability

6 documents6 sources
Severity
7.5HIGHNVD
EPSS
3.8%
top 11.85%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedDec 20
Latest updateApr 30

Description

wu-ftp with FTP conversion enabled allows an attacker to execute commands via a malformed file name that is interpreted as an argument to the program that does the conversion, e.g. tar or uncompress.

CVSS vector

AV:N/AC:L/C:P/I:P/A:PExploitability: 10.0 | Impact: 6.4

Affected Packages3 packages

NVDredhat/linux5.2, 6.0, 6.1+2
NVDuniversity_of_washington/wu-ftpd2.4.2, 2.5.0, 2.6.0+2

🔴Vulnerability Details

2
GHSA
GHSA-2hff-p384-25wq: wu-ftp with FTP conversion enabled allows an attacker to execute commands via a malformed file name that is interpreted as an argument to the program2022-04-30
CVEList
CVE-1999-0997: wu-ftp with FTP conversion enabled allows an attacker to execute commands via a malformed file name that is interpreted as an argument to the program2000-04-25

💥Exploits & PoCs

1
Exploit-DB
WU-FTPD 2.4.2/2.5 .0/2.6.0/2.6.1/2.6.2 - FTP Conversion1999-12-20

🔍Detection Rules

1
Suricata
GPL FTP tar parameters2010-09-23

📋Vendor Advisories

1
Red Hat
CVE-1999-0997: wu-ftp with FTP conversion enabled allows an attacker to execute commands via a malformed file name that is interpreted as an argument to the program