Skip to main content

CVE-1999-1475: ProFTPd 1.2 compiled with the mod_sqlpw module records user passwords in the wtmp log file, which al

Medium
VulnerabilityCVE-1999-1475cve-1999-1475
Published: Fri Nov 19 1999 (11/19/1999, 05:00:00 UTC)
Source: NVD
Vendor/Project: proftpd_project
Product: proftpd

Description

ProFTPd 1.2 compiled with the mod_sqlpw module records user passwords in the wtmp log file, which allows local users to obtain the passwords and gain privileges by reading wtmp, e.g. via the last command.

AI-Powered Analysis

AILast updated: 07/01/2025, 13:42:44 UTC

Technical Analysis

CVE-1999-1475 is a vulnerability found in ProFTPd version 1.2 when compiled with the mod_sqlpw module. ProFTPd is a widely used FTP server software. The mod_sqlpw module is designed to authenticate users against a SQL database. The vulnerability arises because the module records user passwords in plaintext within the wtmp log file. The wtmp file is a standard Unix log file that tracks user login sessions and is typically accessible to local users. Because passwords are stored in plaintext in this log, any local user with read access to the wtmp file can retrieve other users' FTP passwords by examining the log entries, for example, by using the 'last' command that reads wtmp. This exposure allows an attacker to escalate privileges by using the stolen credentials to gain unauthorized access to the FTP server or other systems where the same credentials might be reused. The vulnerability has a CVSS score of 4.6 (medium severity), with an attack vector classified as local (AV:L), low attack complexity (AC:L), no authentication required (Au:N), and impacts on confidentiality, integrity, and availability (C:P/I:P/A:P). There is no patch available for this vulnerability, and no known exploits have been reported in the wild. However, the risk remains for environments still running this outdated version of ProFTPd with the mod_sqlpw module enabled. The vulnerability is primarily a local privilege escalation and credential disclosure issue due to improper logging practices.

Potential Impact

For European organizations, the impact of this vulnerability depends largely on whether they operate legacy systems running ProFTPd 1.2 compiled with mod_sqlpw. If such systems exist, local users or attackers who have gained limited access could extract FTP user passwords from the wtmp logs, leading to unauthorized access to FTP services. This could result in data breaches, unauthorized data modification, or disruption of services hosted on the FTP server. Given that FTP is often used for transferring sensitive files, exposure of credentials could compromise confidentiality and integrity of critical data. Additionally, if credentials are reused across other systems, the risk extends beyond the FTP server itself. Although the vulnerability requires local access, insider threats or attackers who have already penetrated the network perimeter could exploit it to escalate privileges. European organizations with strict data protection regulations such as GDPR could face compliance issues if sensitive data is exposed due to this vulnerability. The absence of a patch means organizations must rely on compensating controls or upgrades to mitigate risk.

Mitigation Recommendations

Since no patch is available for this vulnerability, European organizations should consider the following specific mitigation steps: 1) Upgrade ProFTPd to a more recent, supported version that does not exhibit this vulnerability and avoid using the mod_sqlpw module if possible. 2) Restrict local access permissions to the wtmp log file to the minimum necessary users, ensuring that only trusted administrators can read it. 3) Implement strict access controls and monitoring on systems running ProFTPd to detect unauthorized local access attempts. 4) Consider disabling or replacing the mod_sqlpw module with alternative authentication mechanisms that do not log plaintext passwords. 5) Conduct audits of FTP server configurations and logs to identify any exposure of credentials. 6) Educate system administrators and users about the risks of password reuse and enforce strong, unique passwords. 7) If upgrading is not immediately feasible, isolate affected FTP servers within secure network segments to limit local user access. 8) Employ host-based intrusion detection systems to alert on suspicious activities related to wtmp file access or FTP authentication anomalies.

Need more detailed analysis?Get Pro

Threat ID: 682ca32cb6fd31d6ed7df41e

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 7/1/2025, 1:42:44 PM

Last updated: 7/27/2025, 12:00:06 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats