header-logo
Suggest Exploit
vendor:
NetFile FTP/Web Server
by:
Unknown
8.1
CVSS
HIGH
Directory Traversal
22
CWE
Product Name: NetFile FTP/Web Server
Affected Version From: 6.7.2.1085
Affected Version To: 6.7.2.1085
Patch Exists: YES
Related CWE: CVE-2004-1902
CPE: a:fastream:netfile_ftp_web_server:6.7.2.1085
Metasploit:
Other Scripts:
Platforms Tested: Windows
2004

Directory Traversal Vulnerability in NetFile FTP/Web Server

The NetFile FTP/Web Server is prone to a directory traversal vulnerability due to insufficient sanitization of user-supplied data. This vulnerability allows an attacker to create, view, and delete arbitrary files outside the web root.

Mitigation:

It is recommended to update to a fixed version of NetFile FTP/Web Server that properly sanitizes user-supplied input. Implementing proper input validation and sanitization techniques can also help mitigate this vulnerability.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/10658/info

The NetFile FTP/Web Server is reported prone to a directory traversal vulnerability due to insufficient sanitization of user-supplied data. This can allow an attacker to create, view, and delete arbitrary files outside the web root.

Fastream NetFILE FTP/Web Server versions 6.7.2.1085 and prior are reported prone to this issue.

http://www.example.com?command=mkdir&filename=..//FOLDER_IS_OUTSIDE_THE_ROOT_DIRECTORY
cqrsecured