9 lines
No EOL
630 B
Text
9 lines
No EOL
630 B
Text
source: https://www.securityfocus.com/bid/13292/info
|
|
|
|
RaidenFTPD is prone to a vulnerability that could allow unauthorized access to files outside the FTP root. The issue exists due to a lack of sufficient sanitization performed on 'SITE urlget' requests. Directory traversal sequences may be passed as a parameter for this request.
|
|
|
|
This vulnerability allows a remote attacker to read files outside of the FTP document root directory. An attacker may read files with the privileges of the FTP server process.
|
|
|
|
This issue was reported to affect all versions of RaidenFTPD prior to 2.4.2241.
|
|
|
|
quote site urlget file://\..\\boot.ini |