Serv-U FTPS Server Command Channel SSL Negotiation and FTP Server Directory Traversal Vulnerability
RISK: Medium Risk
TYPE: Servers - Internet App Servers
Two vulnerability have been identified in Serv-U, which can be exploited by malicious people to bypass certain security restrictions, disclose potentially sensitive information and manipulate certain data.
- The vulnerability is caused due to the FTPS server leaving the command channel in an operational state, although the SSL negotiation on the command channel failed. This can be exploited to e.g. perform Man-in-the-Middle (MitM) attacks. The vulnerability is reported in versions prior to 11.1.0.3.
- The vulnerability is caused due to an input sanitisation error within the FTP server and can be exploited to e.g. download or delete files outside of the FTP's root directory via directory traversal attacks. The vulnerability is confirmed in version 10.3.0.1 and 11.1.0.3 on Windows. Other versions may also be affected.
Impact
- Security Restriction Bypass
- Information Disclosure
- Data Manipulation
System / Technologies affected
- Serv-U 10.x
- Serv-U 11.x
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
For Serv-U FTPS Server Command Channel SSL Negotiation Vulnerability,
Update to version 11.1.0.3.
For Serv-U FTP Server Directory Traversal Vulnerability
Restrict access to trusted users only.
Vulnerability Identifier
- No CVE information is available
Source
Related Link
Share with