{ "schema_version": "1.4.0", "id": "GHSA-qgjr-23fm-j744", "modified": "2022-05-14T02:39:23Z", "published": "2022-05-14T02:39:23Z", "aliases": [ "CVE-2008-5692" ], "details": "Ipswitch WS_FTP Server Manager before 6.1.1, and possibly other Ipswitch products, allows remote attackers to bypass authentication and read logs via a logLogout action to FTPLogServer/login.asp followed by a request to FTPLogServer/LogViewer.asp with the localhostnull account name.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5692" }, { "type": "WEB", "url": "http://aluigi.altervista.org/adv/wsftpweblog-adv.txt" }, { "type": "WEB", "url": "http://docs.ipswitch.com/WS_FTP_Server611/ReleaseNotes/index.htm?k_id=ipswitch_ftp_documents_worldwide_ws_ftpserverv611releasenotes#link12" }, { "type": "WEB", "url": "http://secunia.com/advisories/28822" }, { "type": "WEB", "url": "http://securityreason.com/securityalert/4799" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/487686/100/200/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/487697/100/200/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/27654" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2008/0473" } ], "database_specific": { "cwe_ids": [ "CWE-287" ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2008-12-19T18:30:00Z" } }