SmartFTP Exposes File System

SmartFTP Exposes File System
Reported June 13 by
Moritz Jodeit

SmartFTP v0.2


A bug in the SmartFTP-D Server will give an attacker full access to the server if the attacker has write access to files on the server.

When a user logs into the server, SmartFTD-D checks for a special user file and if it exists configuration information (such as the user"s password, rights, etc.) will be read from the file.

During the login process the service doesn"t check for illegal characters, and therfore by using "..\" characters an intruder can switch to other directories where a Trojan user configuration file could have been stored via anonymous upload or via a user with valid access to the system.


Mindstorm is aware of this matter and will publish a correction in their next product build, however no date has been given for the release of the next build.

Discovered and reported by Moritz Jodeit

Hide comments


  • Allowed HTML tags: <em> <strong> <blockquote> <br> <p>

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.