The ASG/ProxySG FTP proxy WebFTP mode allows intercepting FTP connections where a user accesses an FTP server via a ftp:// URL in a web browser. An information disclosure vulnerability in the WebFTP mode allows a malicious user to obtain plaintext authentication credentials for a remote FTP server from the ASG/ProxySG's web listing of the FTP server. Affected versions: ASG 6.6 and 6.7 prior to 6.7.4.2; ProxySG 6.5 prior to 6.5.10.15, 6.6, and 6.7 prior to 6.7.4.2.
Advisories
Source ID Title
EUVD EUVD EUVD-2018-10102 The ASG/ProxySG FTP proxy WebFTP mode allows intercepting FTP connections where a user accesses an FTP server via a ftp:// URL in a web browser. An information disclosure vulnerability in the WebFTP mode allows a malicious user to obtain plaintext authentication credentials for a remote FTP server from the ASG/ProxySG's web listing of the FTP server. Affected versions: ASG 6.6 and 6.7 prior to 6.7.4.2; ProxySG 6.5 prior to 6.5.10.15, 6.6, and 6.7 prior to 6.7.4.2.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: symantec

Published:

Updated: 2024-08-05T11:08:21.699Z

Reserved: 2018-10-15T00:00:00

Link: CVE-2018-18371

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-08-30T09:15:16.660

Modified: 2024-11-21T03:55:48.747

Link: CVE-2018-18371

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses