CVE-2008-4247

N/A Unknown
Published: September 25, 2008 Modified: April 23, 2026
View on NVD

Description

ftpd in OpenBSD 4.3, FreeBSD 7.0, NetBSD 4.0, Solaris, and possibly other operating systems interprets long commands from an FTP client as multiple commands, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks and execute arbitrary FTP commands via a long ftp:// URI that leverages an existing session from the FTP client implementation in a web browser.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://bugs.proftpd.org/show_bug.cgi?id=3115
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/32068
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/32070
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/33341
Source: af854a3a-2127-422b-91ae-364da2661108
http://security.FreeBSD.org/advisories/FreeBSD-SA-08:12.ftpd.asc
Source: af854a3a-2127-422b-91ae-364da2661108
http://securityreason.com/achievement_securityalert/56
Source: af854a3a-2127-422b-91ae-364da2661108
http://securityreason.com/securityalert/4313
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.openbsd.org/cgi-bin/cvsweb/src/libexec/ftpd/ftpcmd.y
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.openbsd.org/cgi-bin/cvsweb/src/libexec/ftpd/ftpd.c
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securitytracker.com/id?1020946
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securitytracker.com/id?1021112
Source: af854a3a-2127-422b-91ae-364da2661108

30 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

openbsd netbsd freebsd