Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Directory Traversal Vulnerability in File Transfer - exploit.company
header-logo
Suggest Exploit
vendor:
File Transfer
by:
7.5
CVSS
HIGH
Directory Traversal
22
CWE
Product Name: File Transfer
Affected Version From:
Affected Version To: 1.2f
Patch Exists: YES
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:

Directory Traversal Vulnerability in File Transfer

File Transfer is prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input data. Exploiting this issue allows an attacker to access arbitrary files outside of the application's root directory. This can expose sensitive information that could help the attacker launch further attacks.

Mitigation:

The vendor should update the software to properly sanitize user-supplied input data to prevent directory traversal attacks. Users are advised to upgrade to File Transfer version 1.2f or later.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/28453/info

File Transfer is prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input data.

Exploiting this issue allows an attacker to access arbitrary files outside of the application's root directory. This can expose sensitive information that could help the attacker launch further attacks.

This issue affects versions prior to File Transfer 1.2f. 

../../../../../../../boot.ini