vendor:
Wing FTP Server
by:
Cary Hooper
8.8
CVSS
HIGH
Privilege Escalation
N/A
CWE
Product Name: Wing FTP Server
Affected Version From: v6.2.5 and prior
Affected Version To: v6.2.5 and prior
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Ubuntu 18.04
2020
Wing FTP Server 6.2.5 – Privilege Escalation
If $_WINGFTPDIR is the installation directory where Wing FTP was installed, $_WINGFTPDIR/wftpserver/session/* corresponds to user sessions which are world readable/writeable (possibly exploitable). $_WINGFTPDIR/wftpserver/session_admin/* corresponds to admin sessions which are world readable/writeable. An attacker can wait for an admin to log in, steal their session, then launch a curl command which executes LUA.
Mitigation:
Ensure that the installation directory of Wing FTP is not world readable/writeable.