CVE-2017-15272
15.11.2017, 16:29
The PSFTPd 10.0.4 Build 729 server stores its configuration inside PSFTPd.dat. This file is a Microsoft Access Database and can be extracted. The application sets the encrypt flag with the password "ITsILLEGAL"; however, this password is not required to extract the data. Cleartext is used for a user password.Enginsight
Vendor | Product | Version |
---|---|---|
psftp | psftpd | 10.0.4 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References