Vulnerability Details : CVE-2009-5012
ftpserver.py in pyftpdlib before 0.5.2 does not require the l permission for the MLST command, which allows remote authenticated users to bypass intended access restrictions and list the root directory via an FTP session.
Exploit prediction scoring system (EPSS) score for CVE-2009-5012
Probability of exploitation activity in the next 30 days: 0.14%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 49 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2009-5012
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:N/A:N |
8.0
|
2.9
|
NIST |
CWE ids for CVE-2009-5012
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2009-5012
-
http://code.google.com/p/pyftpdlib/source/browse/trunk/HISTORY
GitHub - giampaolo/pyftpdlib: Extremely fast and scalable Python FTP server library
-
http://code.google.com/p/pyftpdlib/issues/detail?id=114
"l" permission should be valid also for MLST command · Issue #114 · giampaolo/pyftpdlib · GitHub
-
http://code.google.com/p/pyftpdlib/source/diff?spec=svn596&r=596&format=side&path=/trunk/pyftpdlib/ftpserver.py
GitHub - giampaolo/pyftpdlib: Extremely fast and scalable Python FTP server library
-
http://code.google.com/p/pyftpdlib/source/detail?r=596
GitHub - giampaolo/pyftpdlib: Extremely fast and scalable Python FTP server library
Products affected by CVE-2009-5012
- cpe:2.3:a:g.rodola:pyftpdlib:*:*:*:*:*:*:*:*
- cpe:2.3:a:g.rodola:pyftpdlib:0.1:*:*:*:*:*:*:*
- cpe:2.3:a:g.rodola:pyftpdlib:0.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:g.rodola:pyftpdlib:0.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:g.rodola:pyftpdlib:0.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:g.rodola:pyftpdlib:0.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:g.rodola:pyftpdlib:0.5.0:*:*:*:*:*:*:*