header-logo
Suggest Exploit
vendor:
FTGate
by:
Unknown

Vulnerability in Floosietek’s FTGate

A vulnerability in Floosietek's FTGate allows remote malicious users to steal local files. The web server fails to check whether requested files fall outside its document tree (by using '..' in the URL). Thus attackers can retrieve files in the same drives as that on which the software resides if they know or can get its filename.

Mitigation:

Implement proper input validation and sanitization to prevent directory traversal attacks. Update to the latest version of Floosietek's FTGate that addresses this vulnerability.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/280/info

A vulnerability in Floosietek's FTGate allows remote malicious users to steal local files.

Floosietek's FTGate is a Win32 mail server program. One of its features is allowing administrators to check the status of the mail server using a web browser via a built-in web server.

The web server fails to check whether requested files fall outside its document tree (by using ".." in the URL). Thus attackers can retrieve files in the same drives as that on which the software resides if they know or can get it's filename. 

http://www.example.com:8080/../newuser.txt