An issue was discovered in the SFTP Server component in Core FTP 2.0 Build 674. Using the MDTM FTP command, a remote attacker can use a directory traversal technique (..\..\) to browse outside the root directory to determine the existence of a file on the operating system, and its last modified date.
References
Link | Resource |
---|---|
https://www.exploit-db.com/exploits/46534 | Exploit Third Party Advisory VDB Entry |
https://seclists.org/fulldisclosure/2019/Mar/25 | Exploit Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/107449 | Third Party Advisory VDB Entry |
http://www.coreftp.com/forums/viewtopic.php?f=15&t=4022509 | Product Vendor Advisory |
http://seclists.org/fulldisclosure/2019/Aug/22 | |
http://packetstormsecurity.com/files/154205/CoreFTP-Server-MDTM-Directory-Traversal.html |
Configurations
Information
Published : 2019-03-22 13:29
Updated : 2019-08-26 00:15
NVD link : CVE-2019-9649
Mitre link : CVE-2019-9649
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
coreftp
- core_ftp