Untrusted search path in FileZilla before 3.41.0-rc1 allows an attacker to gain privileges via a malicious 'fzsftp' binary in the user's home directory.
The product searches for critical resources using an externally-supplied search path that can point to resources that are not under the product's direct control.
Link | Tags |
---|---|
https://www.tenable.com/security/research/tra-2019-14 | third party advisory |
https://svn.filezilla-project.org/filezilla?view=revision&revision=9112 | patch vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R7WUJWTJA55ILACKLTJFSQUYEBHVYENL/ | vendor advisory |
https://security.gentoo.org/glsa/202007-51 | third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2022/05/msg00037.html | third party advisory mailing list |