Описание
Directory traversal vulnerability in Nexgen FTP Server before 2.2.3.23 allows remote authenticated users to read or list arbitrary files via (1) "..", (2) ".." (backslash dot dot), or (3) "/../" sequences in (a) RETR (get), (b) NLST (ls), (c) LIST (ls), (d) RNFR, or (e) RNTO FTP commands.
Ссылки
- Vendor Advisory
- URL Repurposed
- Exploit
- Patch
- Exploit
- Vendor Advisory
- URL Repurposed
- Exploit
- Patch
- Exploit
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:nexgen:nexgen_ftp_server:1.0:*:*:*:*:*:*:*
cpe:2.3:a:nexgen:nexgen_ftp_server:2.0:*:*:*:*:*:*:*
cpe:2.3:a:nexgen:nexgen_ftp_server:2.1:*:*:*:*:*:*:*
cpe:2.3:a:nexgen:nexgen_ftp_server:2.2:*:*:*:*:*:*:*
EPSS
Процентиль: 89%
0.04312
Низкий
4 Medium
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
Directory traversal vulnerability in Nexgen FTP Server before 2.2.3.23 allows remote authenticated users to read or list arbitrary files via (1) "..", (2) "\..\" (backslash dot dot), or (3) "/../" sequences in (a) RETR (get), (b) NLST (ls), (c) LIST (ls), (d) RNFR, or (e) RNTO FTP commands.
EPSS
Процентиль: 89%
0.04312
Низкий
4 Medium
CVSS2
Дефекты
NVD-CWE-Other