• Home
  • References
  • Wiki
  • About me
  • Imprint

Dec 11: INFOSERVE-ADV2011-09 - zFTPServer Suite 6.0.0.52 'rmdir' Directory Traversal

Advisory:
zFTPServer Suite 6.0.0.52 'rmdir' Directory Traversal
Advisory ID:
INFOSERVE-ADV2011-09
Author:
Stefan Schurtz
Contact:
security@infoserve.de
Affected Software:
Successfully tested on zFTPServer Suite 6.0.0.52
Vendor URL:
http://www.zftpserver.com/
Vendor Status:
fixed
CVE-ID:
CVE-2011-4717
 
==========================
Vulnerability Description
==========================
 
zFTPServer 'rmdir' is prone to a Directory Traversal, which makes it possible to delete directories in the system
 
==================
PoC-Exploit
==================

Tested on: WindowsXP (SP3)
User Permissions:  Files->Read / Directories->List, Delete



=========
Solution
=========

Fixed, but no new release available, as a workaround disable "Directories->Delete"

====================
Disclosure Timeline
====================

04-Dec-2011 - informed vendor
06-Dec-2011 - fixed by vendor
10-Dec-2011 - release date of this security advisory

========
Credits
========

Vulnerabilitiy found and advisory written by the INFOSERVE security team.

===========
References
===========

http://forum.zftpserver.com/viewtopic.php?f=4&t=2927
http://www.infoserve.de/system/files/advisories/INFOSERVE-ADV2011-09.txt
Geschrieben von Stefan Schurtz in Security Advisories Kommentare: (0) Trackbacks: (0)
Tags für diesen Artikel: advisory, directory traversal, infoserve, security, sicherheit
Zuletzt bearbeitet am 11.12.2011 12:56

Trackbacks
Trackback-URL für diesen Eintrag

Keine Trackbacks

Kommentare
Ansicht der Kommentare: (Linear | Verschachtelt)

Noch keine Kommentare


Kommentar schreiben


Um maschinelle und automatische Übertragung von Spamkommentaren zu verhindern, bitte die Zeichenfolge im dargestellten Bild in der Eingabemaske eintragen. Nur wenn die Zeichenfolge richtig eingegeben wurde, kann der Kommentar angenommen werden. Bitte beachten Sie, dass Ihr Browser Cookies unterstützen muss, um dieses Verfahren anzuwenden.
CAPTCHA 1CAPTCHA 2CAPTCHA 3CAPTCHA 4CAPTCHA 5


Textile-Formatierung erlaubt
Sie können [geshi lang=LANG][/lang] Tags verwenden um Quellcode abhängig von der gewählten Programmiersprache einzubinden
 
 

Kalender

Zurück December '19
Mo Tu We Th Fr Sa Su
            1
2 3 4 5 6 7 8
9 10 11 12 13 14 15
16 17 18 19 20 21 22
23 24 25 26 27 28 29
30 31          

Suche

Categories

  • XML Allgemein
  • XML Bug Bounty
  • XML Cisco
  • XML Coding
  • XML Fachartikel
  • XML Forensics
  • XML Hacking Challenge
  • XML IT-Security
  • XML Kryptographie
  • XML Network Monitoring
  • XML OpenBSD
  • XML Reverse Engineering
  • XML Security Advisories
  • XML Steganographie


Alle Kategorien

taggs

xml abra xml ACL xml adobe xml advisory xml apple.com xml artikel xml backdoor xml buffer overflow xml bug bounty xml bypass xml challenges xml check point xml Cisco xml coding xml cross site request forgery xml cross site scripting xml dd xml denial of service xml directory traversal xml diskinternals xml dos xml forensics xml heise xml html5 xml http xml HTTPS xml icinga xml infoserve xml Intrusion Prevention xml IPv6 xml lfi xml linux reader xml metasploit xml nagios xml nessus xml OpenBSD xml open redirection xml OpenSSH xml polipo xml proxy xml saar xml saarland xml security xml Sicherheit xml SNMP xml sql injection xml steganographie xml store.apple.com xml sven xml xss

Exploit-DB updates by Offensive Security

[local] FTP Commander Pro 8.03 - Local Stack Overflow

Friday, December 13. 2019
[webapps] NVMS 1000 - Directory Traversal

Friday, December 13. 2019
[webapps] Bullwark Momentum Series JAWS 1.0 - Directory Traversal

Thursday, December 12. 2019
[webapps] OpenNetAdmin 18.1.1 - Command Injection Exploit (Metasploit)

Thursday, December 12. 2019
[dos] Lenovo Power Management Driver 1.67.17.48 - 'pmdrvs.sys' Denial of Service (PoC)

Thursday, December 12. 2019

OpenBSD Journal

Meet Radiant Award Recipient Claudio Jeker

Thursday, December 12. 2019
attention please: host's IP stack behavior got changed slightly

Monday, December 9. 2019
e2k19 Hackathon Report: At e2k19 nobody can hear you scream (Claudio Jeker)

Wednesday, December 4. 2019
syscall call-from verification

Monday, December 2. 2019
unwind(8) gains "Happy Eyeballs"-like flexibility

Thursday, November 28. 2019
p2k19 Hackathon Report: Stefan Sperling on iwm(4) wifi progress, more

Tuesday, November 26. 2019
krw@ adventures at p2k19

Tuesday, November 19. 2019
p2k19 Hackathon Report: Jeremy Evans on PostgreSQL and Ruby

Monday, November 18. 2019
p2k19 Hackathon Report: Landry Breuil on unveil(2)-ing Mozilla, sqlite3 testing

Monday, November 18. 2019

Archives

  • December 2019
  • November 2019
  • October 2019
  • Das Neueste ...
  • Älteres ...

Verwaltung des Blogs

Login

Syndicate This Blog

  • XML RSS 0.91 feed
  • XML RSS 1.0 feed
  • XML RSS 2.0 feed
  • ATOM/XML ATOM 1.0 feed
  • XML RSS 2.0 Kommentare
 

Layout by Andreas Viklund | Serendipity template by Carl