In the ABB IDAL FTP server, an authenticated attacker can traverse to arbitrary directories on the hard disk with "CWD ../" and then use the FTP server functionality to download and upload files. An unauthenticated attacker can take advantage of the hardcoded or default credential pair exor/exor to become an authenticated attacker.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://seclists.org/fulldisclosure/2019/Jun/37 | mailing list exploit third party advisory |
https://search.abb.com/library/Download.aspx?DocumentID=3ADR010377&LanguageCode=en&DocumentPartId=&Action=Launch | patch vendor advisory mitigation |
http://packetstormsecurity.com/files/153396/ABB-IDAL-FTP-Server-Path-Traversal.html | exploit vdb entry third party advisory |
http://www.securityfocus.com/bid/108886 | vdb entry third party advisory |
https://www.darkmatter.ae/xen1thlabs/abb-idal-ftp-server-path-traversal-vulnerability-xl-19-008/ | third party advisory exploit |