Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> FTP >> FTP Writeable Directories


Vulnerability Assessment Details

FTP Writeable Directories

Vulnerability Assessment Summary
Checks for FTP directories which are world writeable

Detailed Explanation for this Vulnerability Assessment

Summary :

The remote FTP server contains world-writeable files

Description :

By crawling through the remote FTP server, several directories
where marked as being world writeable.

A possible hacker may use this misconfiguration problem to use the
remote FTP server to host arbitrary data, including possibly
illegal content (ie: Divx movies, etc...).

Solution :

Configure the remote FTP directories so that they are not
world-writeable.

Network Security Threat Level:

Medium / CVSS Base Score : 5
(AV:R/AC:L/Au:NR/C:N/A:P/I:P/B:I)


Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 TNS

Cables, Connectors

Intel PRO/1000 PT Quad Port Server Adapter EXPI9404PTG2L20 Low Profile PCI-E
$52.11
Intel PRO/1000 PT Quad Port Server Adapter EXPI9404PTG2L20 Low Profile PCI-E picture81Y4503 - Backplane SAS 8 HD Connection pulled from X3650 Server IBM
$99.99
81Y4503 - Backplane SAS 8 HD Connection pulled from X3650 Server IBM  pictureIntel P4000 Intel S1400FP2 Intel E5-2420 1.9GHz 24GB 4 x 500GB Server 9240-4i
$279.0
Intel P4000 Intel S1400FP2 Intel E5-2420 1.9GHz 24GB 4 x 500GB Server 9240-4i pictureGENUINE HP 8GB 1X8GB 500205-071 2RX4 PC3-10600R Memory G7 & G6 Servers
$15.0
GENUINE HP 8GB 1X8GB 500205-071 2RX4 PC3-10600R Memory G7 & G6 Servers picture


Discussions

No Discussions have been posted on this vulnerability.