Vulnerability Description
auth_db_config.py in Pyftpd 0.8.4 contains hard-coded usernames and passwords for the (1) test, (2) user, and (3) roxon accounts, which allows remote attackers to read arbitrary files from the FTP server.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Debian | Pyftpd | 0.8.4 |
Related Weaknesses (CWE)
References
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=585776Mailing ListPatch
- http://www.openwall.com/lists/oss-security/2010/06/13/2Mailing List
- http://www.securityfocus.com/bid/40839Broken LinkThird Party AdvisoryVDB Entry
- https://exchange.xforce.ibmcloud.com/vulnerabilities/59431Third Party AdvisoryVDB Entry
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=585776Mailing ListPatch
- http://www.openwall.com/lists/oss-security/2010/06/13/2Mailing List
- http://www.securityfocus.com/bid/40839Broken LinkThird Party AdvisoryVDB Entry
- https://exchange.xforce.ibmcloud.com/vulnerabilities/59431Third Party AdvisoryVDB Entry
FAQ
What is CVE-2010-2073?
CVE-2010-2073 is a vulnerability with a CVSS score of 7.5 (HIGH). auth_db_config.py in Pyftpd 0.8.4 contains hard-coded usernames and passwords for the (1) test, (2) user, and (3) roxon accounts, which allows remote attackers to read arbitrary files from the FTP ser...
How severe is CVE-2010-2073?
CVE-2010-2073 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2010-2073?
Check the references section above for vendor advisories and patch information. Affected products include: Debian Pyftpd.