Description
FTPServer.py in pyftpdlib before 0.2.0 does not increment the attempted_logins count for a USER command that specifies an invalid username, which makes it easier for remote attackers to obtain access via a brute-force attack.
Published: 2010-10-19
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2010-0017 FTPServer.py in pyftpdlib before 0.2.0 does not increment the attempted_logins count for a USER command that specifies an invalid username, which makes it easier for remote attackers to obtain access via a brute-force attack.
Github GHSA Github GHSA GHSA-9x66-ghqx-8g5r Improper Authentication in pyftpdlib
History

No history.

Subscriptions

G.rodola Pyftpdlib
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-09-17T01:01:07.402Z

Reserved: 2010-10-19T00:00:00.000Z

Link: CVE-2007-6737

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2010-10-19T20:00:01.707

Modified: 2026-04-29T01:13:23.040

Link: CVE-2007-6737

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses