Directory traversal vulnerability in Core FTP Server 1.2 before build 515 allows remote authenticated users to determine the existence of arbitrary files via a /../ sequence in an XCRC command.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://packetstormsecurity.com/files/125073/Core-FTP-Server-1.2-DoS-Traversal-Disclosure.html | exploit |
http://www.osvdb.org/102967 | vdb entry |
http://coreftp.com/forums/viewtopic.php?t=2985707 | vendor advisory |
http://secunia.com/advisories/56850 | third party advisory vendor advisory |
http://seclists.org/fulldisclosure/2014/Feb/39 | mailing list exploit |