RaidenFTPD Multiple Command Traversal Arbitrary File Access

medium Nessus Plugin ID 18224

Synopsis

The remote FTP server has a directory traversal vulnerability.

Description

The remote host is running the RaidenFTPD FTP server. This version has a directory traversal vulnerability. An authenticated attacker could exploit this to read and write arbitrary files outside of the intended FTP root.

Solution

Upgrade to RaidenFTPD 2.1 build 952 or later.

Plugin Details

Severity: Medium

ID: 18224

File Name: raidenftpd_dir_traversal.nasl

Version: 1.13

Type: remote

Family: FTP

Published: 5/11/2005

Updated: 7/25/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: Medium

Base Score: 6.4

Temporal Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N

Vulnerability Information

Required KB Items: ftp/login

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 4/26/2001

Reference Information

CVE: CVE-2001-0491

BID: 2655