Description
The PSFTPd 10.0.4 Build 729 server does not properly escape data before writing it into a Comma Separated Values (CSV) file. This can be used by attackers to hide data in the Graphical User Interface (GUI) view and create arbitrary entries to a certain extent. Special characters such as '"' and ',' and '\r' are not escaped and can be used to add new entries to the log.
Exploits (1)
References (4)
Core 4
Core References
Third Party Advisory, VDB Entry x_refsource_misc
http://packetstormsecurity.com/files/144972/PSFTPd-Windows-FTP-Server-10.0.4-Build-729-Use-After-Free-Log-Injection.html
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/541518/100/0/threaded
Third Party Advisory x_refsource_misc
https://www.x41-dsec.de/lab/advisories/x41-2017-006-psftpd/
Third Party Advisory, VDB Entry exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/43144/
Scores
CVSS v3
5.3
EPSS
0.1397
EPSS Percentile
94.4%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Details
CWE
CWE-20
Status
published
Products (1)
psftp/psftpd
10.0.4
Published
Nov 15, 2017
Tracked Since
Feb 18, 2026