CVE-2008-4247
Published Sep 25, 2008
Last updated 12 years ago
Overview
- Description
- ftpd in OpenBSD 4.3, FreeBSD 7.0, NetBSD 4.0, Solaris, and possibly other operating systems interprets long commands from an FTP client as multiple commands, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks and execute arbitrary FTP commands via a long ftp:// URI that leverages an existing session from the FTP client implementation in a web browser.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-352
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:freebsd:freebsd:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "47E0A416-733A-4616-AE08-150D67FCEA70" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9875E709-11BA-4B8F-A2FC-26844DD4D563" }, { "criteria": "cpe:2.3:o:openbsd:openbsd:4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F12313A0-1EAF-4652-9AB1-799171CFFEA9" } ], "operator": "OR" } ] } ]