发布时间 :2001-05-03 00:00:00
修订时间 :2016-10-17 22:10:27

[原文]Directory traversal vulnerability in War FTP 1.67.04 allows remote attackers to list directory contents and possibly read files via a "dir *./../.." command.

[CNNVD]War FTP目录遍历漏洞(CNNVD-200105-016)

        War FTP 1.67.04版本存在目录遍历漏洞。远程攻击者可以借助"dir *./../.."命令列出目录内容以及可能读取文件。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  BUGTRAQ  20010306 Warftp 1.67b04 Directory Traversal

- 漏洞信息

War FTP目录遍历漏洞
中危 路径遍历
2001-05-03 00:00:00 2005-10-12 00:00:00
        War FTP 1.67.04版本存在目录遍历漏洞。远程攻击者可以借助"dir *./../.."命令列出目录内容以及可能读取文件。

- 公告与补丁


- 漏洞信息 (20661)

Jarle Aase War FTPD 1.67 b04 Directory Traversal Vulnerability (EDBID:20661)
windows remote
2001-03-06 Verified
0 se00020
N/A [点击下载]

A remote user could gain read access to directories outside of the ftp root in a Jarle Aase War FTPD Server. Once a user is logged into the server, a specially crafted 'dir' command will disclose an arbitrary directory. This vulnerability could allow an attacker to gain read access to various files residing on the target machine. 

dir *./../.. 		

- 漏洞信息

WarFTPd dir Command Traversal Arbitrary Directory Listing
Remote / Network Access Input Manipulation
Loss of Confidentiality Upgrade
Exploit Public Vendor Verified

- 漏洞描述

WarFTPd contains a flaw that allows a remote attacker to obtain arbitrary directory listings outside of the FTP root path. The issue is due to the server not properly sanitizing user input, specifically traversal style attacks (../../) supplied via the "dir" command.

- 时间线

2001-03-06 Unknow
2001-03-06 Unknow

- 解决方案

Upgrade to version 1.67 b5 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者