Vulnerability Details : CVE-2005-2898
NOTE: this issue has been disputed by the vendor. FileZilla 2.2.14b and 2.2.15, and possibly earlier versions, when "Use secure mode" is disabled, uses a weak encryption scheme to store the user's password in the configuration settings file, which allows local users to obtain sensitive information. NOTE: the vendor has disputed the issue, stating that "the problem is not a vulnerability at all, but in fact a fundamental issue of every single program that can store passwords transparently.
Products affected by CVE-2005-2898
- cpe:2.3:a:filezilla:filezilla:2.2.14b:*:*:*:*:*:*:*
- cpe:2.3:a:filezilla:filezilla:2.2.15:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2005-2898
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2005-2898
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.6
|
MEDIUM | AV:L/AC:L/Au:N/C:P/I:P/A:P |
3.9
|
6.4
|
NIST |
References for CVE-2005-2898
-
http://filezilla.sourceforge.net/forum/viewtopic.php?t=1328
Encountered a 404 error
-
http://marc.info/?l=bugtraq&m=112605448327521&w=2
'Re: FileZilla weakly-encrypted password vulnerability: advisory + PoC' - MARC
-
http://marc.info/?l=bugtraq&m=112577523810442&w=2
'FileZilla weakly-encrypted password vulnerability: advisory + PoC' - MARC
-
http://www.securityfocus.com/bid/14730
Exploit
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/22135
FileZilla password weak encryption CVE-2005-2898 Vulnerability Report
Jump to