S4E

CVE-2021-40524 Scanner

CVE-2021-40524 Scanner - Arbitrary File Upload vulnerability in Pure-FTPd

Short Info


Level

High

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

25 days 20 hours

Scan only one

Domain, Subdomain, IPv4

Toolbox

-

Pure-FTPd is an FTP server used globally by various organizations for secure file transfers. It is valued for its simplicity, security features, and compliance with FTP standards, serving both small businesses and large enterprises. Pure-FTPd supports TLS and SSL protocols, enhancing the security of transferred data. Its popularity is due to its open-source nature and the ease of customization for diverse user needs. Widely installed on Linux and UNIX systems, it helps manage website content and share large files efficiently. However, like all software, it can harbor vulnerabilities that could compromise system security.

The Arbitrary File Upload vulnerability in Pure-FTPd allows unauthorized users to upload files without size restrictions, bypassing the intended max_filesize quota. This oversight can lead to an unbounded file upload, which may cause server performance to degrade or completely hang due to resource exhaustion. The issue predominantly affects versions 1.0.23 through 1.0.49, presenting a significant risk to systems that rely on these versions for file transfer operations. Once exploited, attackers can potentially upload malicious payloads, hindering the server's functionality. Administrators should urgently address this vulnerability to prevent exploitation.

This vulnerability primarily stems from the maximum filesize quota enforcement logic in Pure-FTPd, which fails to adequately restrict upload sizes. The endpoint affected typically handles file management requests, allowing users to transfer files onto the server. If exploited, an attacker can upload arbitrary files by invoking the relevant FTP commands to the affected endpoints within versions 1.0.23 to 1.0.49. The vulnerable parameter could include file size or upload directives commonly mismanaged due to the flaw. During a successful attack, a malicious file gets stored, compromising system integrity.

Exploiting this vulnerability can result in several adverse effects, including denial of service when the server resources are exhausted. It may also lead to unauthorized storage of sensitive or malicious files, which can be executed remotely to carry out further attacks. This can compromise data integrity and confidentiality, causing severe disruptions in normal server operations. Organizations may encounter data breaches, loss of customer trust, and legal implications if sensitive data is compromised due to the vulnerability. Therefore, timely mitigation is vital to limit potential damage and secure server environments.

REFERENCES

Get started to protecting your digital assets