cve/2017/CVE-2017-15272.md

18 lines
853 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2017-15272](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15272)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
The PSFTPd 10.0.4 Build 729 server stores its configuration inside PSFTPd.dat. This file is a Microsoft Access Database and can be extracted. The application sets the encrypt flag with the password "ITsILLEGAL"; however, this password is not required to extract the data. Cleartext is used for a user password.
### POC
#### Reference
- http://packetstormsecurity.com/files/144972/PSFTPd-Windows-FTP-Server-10.0.4-Build-729-Use-After-Free-Log-Injection.html
#### Github
No PoCs found on GitHub currently.