The ASG/ProxySG FTP proxy WebFTP mode allows intercepting FTP connections where a user accesses an FTP server via a ftp:// URL in a web browser. An information disclosure vulnerability in the WebFTP mode allows a malicious user to obtain plaintext authentication credentials for a remote FTP server from the ASG/ProxySG's web listing of the FTP server. Affected versions: ASG 6.6 and 6.7 prior to 6.7.4.2; ProxySG 6.5 prior to 6.5.10.15, 6.6, and 6.7 prior to 6.7.4.2.
                
            References
                    | Link | Resource | 
|---|---|
| https://support.symantec.com/us/en/article.SYMSA1472.html | Vendor Advisory | 
| https://support.symantec.com/us/en/article.SYMSA1472.html | Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    21 Nov 2024, 03:55
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://support.symantec.com/us/en/article.SYMSA1472.html - Vendor Advisory | 
24 Jun 2021, 18:54
| Type | Values Removed | Values Added | 
|---|---|---|
| CPE | cpe:2.3:a:symantec:proxysg:*:*:*:*:*:*:*:* | cpe:2.3:a:broadcom:symantec_proxysg:6.6:*:*:*:*:*:*:* cpe:2.3:a:broadcom:symantec_proxysg:*:*:*:*:*:*:*:* | 
Information
                Published : 2019-08-30 09:15
Updated : 2024-11-21 03:55
NVD link : CVE-2018-18371
Mitre link : CVE-2018-18371
CVE.ORG link : CVE-2018-18371
JSON object : View
Products Affected
                broadcom
- symantec_proxysg
- advanced_secure_gateway
CWE
                
                    
                        
                        CWE-327
                        
            Use of a Broken or Risky Cryptographic Algorithm
