A Directory Traversal issue was discovered in the Web GUI in Titan FTP Server 2019 Build 3505. When an authenticated user attempts to preview an uploaded file (through PreviewHandler.ashx) by using a \..\..\ technique, arbitrary files can be loaded in the server response outside the root directory.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://seclists.org/fulldisclosure/2019/Mar/47 | mailing list |
https://www.exploit-db.com/exploits/46611/ | exploit |
http://packetstormsecurity.com/files/152244/Titan-FTP-Server-2019-Build-3505-Directory-Traversal.html | |
https://seclists.org/fulldisclosure/2019/Mar/47 | mailing list exploit third party advisory |
https://www.exploit-db.com/exploits/46611 | exploit vdb entry third party advisory |
http://www.southrivertech.com/software/regsoft/titanftp/v19/verhist_en.html |