Headline
CVE-2019-12815: ProFTPd CVE-2019-12815
An arbitrary file copy vulnerability in mod_copy in ProFTPD up to 1.3.5b allows for remote code execution and information disclosure without authentication, a related issue to CVE-2015-3306.
ID: CVE-2019-12815****Title: ProFTPd mod_copy - arbitrary file copy with improper access control****Release Date: 2019-07-18****Severity: Important****Overview:
Manawyrm has identified a vulnerability in ProFTPd’s mod_copy. mod_copy is supplied in the default installation of ProFTPd and is enabled by default in most distributions (e.g. Debian).
Details:****1: CVE-2019-12815: mod_copy Incorrect Access Control
Description: Issueing CPFR, CPTO commands to a ProFTPd server allows users without write permissions to copy any file on the FTP server.
Fix: https://github.com/proftpd/proftpd/pull/816
Workaround #1: Disable mod_copy in the ProFTPd configuration file.
ProFTPd Bugtracker: http://bugs.proftpd.org/show_bug.cgi?id=4372
Timeline:
- 28.09.2018 Reported to ProFTPd security@, ProFTPd asking for clarifications
- 12.06.2019 Reported to Debian Security Team, replies by Moritz & Salvatore
- 28.06.2019 Deadline for public disclosure on 28.07.2019 announced
- 17.07.2019 Fix published by ProFTPd
Update 23.07.2019: Contrary to news reports, ProFTPd 1.3.6 is also affected and does not contain the fix.
ProFTPd 1.3.6a contains the fix.
Acknowledgments:
Thanks to Salvatore Bonaccorso and Moritz Mühlenhoff from the Debian Security Team
Thanks to TJ from ProFTPd for fixing the issue
Related news
DiCal-RED version 4009 makes use of unmaintained third party components with their own vulnerabilities.