Описание
ProFTPD before 1.3.5e and 1.3.6 before 1.3.6rc5 controls whether the home directory of a user could contain a symbolic link through the AllowChrootSymlinks configuration option, but checks only the last path component when enforcing AllowChrootSymlinks. Attackers with local access could bypass the AllowChrootSymlinks control by replacing a path component (other than the last one) with a symbolic link. The threat model includes an attacker who is not granted full filesystem access by a hosting provider, but can reconfigure the home directory of an FTP user.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | ignored | end of life |
| bionic | not-affected | 1.3.5e-1build1 |
| cosmic | not-affected | 1.3.5e-1build1 |
| devel | not-affected | 1.3.5e-1build1 |
| disco | not-affected | 1.3.5e-1build1 |
| eoan | not-affected | 1.3.5e-1build1 |
| esm-apps/bionic | not-affected | 1.3.5e-1build1 |
| esm-apps/focal | not-affected | 1.3.5e-1build1 |
| esm-apps/jammy | not-affected | 1.3.5e-1build1 |
| esm-apps/noble | not-affected | 1.3.5e-1build1 |
Показывать по
Ссылки на источники
EPSS
2.1 Low
CVSS2
5.5 Medium
CVSS3
Связанные уязвимости
ProFTPD before 1.3.5e and 1.3.6 before 1.3.6rc5 controls whether the home directory of a user could contain a symbolic link through the AllowChrootSymlinks configuration option, but checks only the last path component when enforcing AllowChrootSymlinks. Attackers with local access could bypass the AllowChrootSymlinks control by replacing a path component (other than the last one) with a symbolic link. The threat model includes an attacker who is not granted full filesystem access by a hosting provider, but can reconfigure the home directory of an FTP user.
ProFTPD before 1.3.5e and 1.3.6 before 1.3.6rc5 controls whether the h ...
ProFTPD before 1.3.5e and 1.3.6 before 1.3.6rc5 controls whether the home directory of a user could contain a symbolic link through the AllowChrootSymlinks configuration option, but checks only the last path component when enforcing AllowChrootSymlinks. Attackers with local access could bypass the AllowChrootSymlinks control by replacing a path component (other than the last one) with a symbolic link. The threat model includes an attacker who is not granted full filesystem access by a hosting provider, but can reconfigure the home directory of an FTP user.
EPSS
2.1 Low
CVSS2
5.5 Medium
CVSS3