CVE-2024-48651

7.5 HIGH

📋 TL;DR

This ProFTPD vulnerability allows authenticated users to gain unintended access to files owned by group ID 0 (root group) due to improper supplemental group inheritance when using mod_sql. The flaw occurs because mod_sql fails to properly set supplemental groups, causing users to inherit GID 0 access. This affects ProFTPD servers with mod_sql enabled and configured for user authentication.

💻 Affected Systems

Products:
  • ProFTPD
Versions: All versions through 1.3.8b before commit cec01cc
Operating Systems: All operating systems running ProFTPD
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when mod_sql is enabled and configured for user authentication. Default ProFTPD installations without mod_sql are not affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Authenticated users could read, modify, or delete files owned by the root group that they shouldn't have access to, potentially leading to privilege escalation or data exposure.

🟠

Likely Case

Authenticated FTP users gain unintended read/write access to files owned by GID 0 that should be restricted, potentially exposing sensitive system files or configuration data.

🟢

If Mitigated

With proper file permissions and access controls, the impact is limited to files that happen to be owned by GID 0 but have overly permissive group permissions.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated FTP access and mod_sql configuration. The vulnerability is in group inheritance logic, not authentication bypass.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: ProFTPD with commit cec01cc or later

Vendor Advisory: https://lists.debian.org/debian-lts-announce/2024/11/msg00032.html

Restart Required: Yes

Instructions:

1. Update ProFTPD to version containing commit cec01cc or later. 2. For Debian/Ubuntu: apt update && apt upgrade proftpd. 3. For source builds: git pull from official repository and rebuild. 4. Restart ProFTPD service.

🔧 Temporary Workarounds

Disable mod_sql

linux

Remove or comment out mod_sql module loading if not required

# Edit proftpd.conf and remove/comment: LoadModule mod_sql.c
# Then restart: systemctl restart proftpd

Restrict GID 0 file permissions

linux

Ensure files owned by GID 0 have restrictive group permissions

# Review files: find / -gid 0 -type f -ls
# Set restrictive permissions: chmod g-rwx /path/to/file

🧯 If You Can't Patch

  • Disable mod_sql module if not essential for operations
  • Implement strict file permissions on all files owned by GID 0 and monitor for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check if mod_sql is enabled in proftpd.conf and version is before commit cec01cc: proftpd -v | grep '1.3.8b' && grep -i 'mod_sql' /etc/proftpd/proftpd.conf

Check Version:

proftpd -v

Verify Fix Applied:

Verify ProFTPD version includes commit cec01cc or is newer than 1.3.8b: proftpd -v

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns by authenticated users to files owned by GID 0
  • Failed permission checks in ProFTPD logs for GID 0 files

Network Indicators:

  • Normal FTP traffic patterns - no specific network indicators

SIEM Query:

source="proftpd.log" (file_access OR permission_denied) AND gid="0"

🔗 References

📤 Share & Export