Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
Ipswitch WS_FTP Professional 'HTTP' Response Format String Vulnerability
Information
Severity
Severity
Medium
Family
Family
FTP
CVSSv2 Base
CVSSv2 Base
4.3
CVSSv2 Vector
CVSSv2 Vector
AV:N/AC:M/Au:N/C:N/I:N/A:P
Solution Type
Solution Type
Vendor Patch
Created
Created
14 years ago
Modified
Modified
5 years ago
Summary
This host is installed with WS_FTP professinal client and is prone to format string vulnerability.
Insight
Insight
The flaw is due to error in 'formatted-printing()' function. It fails to properly sanitize user supplied input before passing it as the format specifier. Specifically, the issue presents itself when the client parses specially crafted responses for a malicious HTTP server.
Affected Software
Affected Software
WS_FTP Professional version prior to 12.2
Solution
Solution
Upgrade to WS_FTP Professional version 12.2.