In WS_FTP Server versions prior to 8.7.4 and 8.8.2, a pre-authenticated attacker could leverage a .NET deserialization vulnerability in the Ad Hoc Transfer module to execute remote commands on the underlying WS_FTP Server operating system.
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Link | Tags |
---|---|
https://www.progress.com/ws_ftp | product |
https://community.progress.com/s/article/WS-FTP-Server-Critical-Vulnerability-September-2023 | vendor advisory |
https://www.theregister.com/2023/10/02/ws_ftp_update/ | third party advisory press/media coverage |
https://www.rapid7.com/blog/post/2023/09/29/etr-critical-vulnerabilities-in-ws_ftp-server/ | third party advisory broken link |
https://attackerkb.com/topics/bn32f9sNax/cve-2023-40044 | third party advisory |
https://censys.com/cve-2023-40044/ | third party advisory |
https://www.assetnote.io/resources/research/rce-in-progress-ws-ftp-ad-hoc-via-iis-http-modules-cve-2023-40044 | third party advisory exploit |
http://packetstormsecurity.com/files/174917/Progress-Software-WS_FTP-Unauthenticated-Remote-Code-Execution.html | third party advisory vdb entry exploit |