header-logo
Suggest Exploit
vendor:
File Transfer
by:
7.5
CVSS
HIGH
Directory Traversal
22
CWE
Product Name: File Transfer
Affected Version From:
Affected Version To: 1.2f
Patch Exists: YES
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:

Directory Traversal Vulnerability in File Transfer

File Transfer is prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input data. Exploiting this issue allows an attacker to access arbitrary files outside of the application's root directory. This can expose sensitive information that could help the attacker launch further attacks.

Mitigation:

The vendor should update the software to properly sanitize user-supplied input data to prevent directory traversal attacks. Users are advised to upgrade to File Transfer version 1.2f or later.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/28453/info

File Transfer is prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input data.

Exploiting this issue allows an attacker to access arbitrary files outside of the application's root directory. This can expose sensitive information that could help the attacker launch further attacks.

This issue affects versions prior to File Transfer 1.2f. 

../../../../../../../boot.ini