Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2011-4800

Опубликовано: 14 дек. 2011
Источник: nvd
CVSS2: 9
EPSS Низкий

Описание

Directory traversal vulnerability in Serv-U FTP Server before 11.1.0.5 allows remote authenticated users to read and write arbitrary files, and list and create arbitrary directories, via a "..:/" (dot dot colon forward slash) in the (1) list, (2) put, or (3) get commands.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:solarwinds:serv-u_file_server:*:*:*:*:*:*:*:*
Версия до 11.1.0.3 (включая)
cpe:2.3:a:solarwinds:serv-u_file_server:3.0.0.16:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:3.0.0.17:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:3.1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:3.1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:3.1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:4.0.0.4:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:4.1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:4.1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:5.0.0.0:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:5.0.0.4:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:5.0.0.9:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:5.0.0.11:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:5.1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:5.2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:5.2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:6.0.0.0:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:6.0.0.1:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:6.0.0.2:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:6.1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:6.1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:6.1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:6.1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:6.2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:6.2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:6.3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:6.3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:6.4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:6.4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:6.4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:6.4.0.3:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:6.4.0.4:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:6.4.0.5:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:6.4.0.6:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:7.0.0.1:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:7.0.0.2:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:7.0.0.3:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:7.0.0.4:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:7.1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:7.1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:7.1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:7.2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:7.2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:7.3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:7.3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:7.3.0.2:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:7.4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:7.4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:8.0.0.1:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:8.0.0.2:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:8.0.0.4:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:8.0.0.5:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:8.0.0.7:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:8.1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:8.1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:8.2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:8.2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:8.2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:9.0.0.1:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:9.0.0.3:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:9.0.0.5:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:9.1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:9.1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:9.2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:9.3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:9.4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:9.4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:10.0.0.2:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:10.0.0.3:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:10.0.0.5:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:10.0.0.7:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:10.1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:10.1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:10.2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:10.2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:10.3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:10.4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:10.5.0.4:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:10.5.0.6:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:10.5.0.11:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:10.5.0.14:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:10.5.0.16:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:10.5.0.19:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:10.5.0.21:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:10.5.0.24:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:11.0.0.0:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:11.0.0.2:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:11.0.0.4:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:11.1.0.5:*:*:*:*:*:*:*

EPSS

Процентиль: 81%
0.01606
Низкий

9 Critical

CVSS2

Дефекты

CWE-22

Связанные уязвимости

github
больше 3 лет назад

Directory traversal vulnerability in Serv-U FTP Server before 11.1.0.5 allows remote authenticated users to read and write arbitrary files, and list and create arbitrary directories, via a "..:/" (dot dot colon forward slash) in the (1) list, (2) put, or (3) get commands.

EPSS

Процентиль: 81%
0.01606
Низкий

9 Critical

CVSS2

Дефекты

CWE-22