Date: 14 Sep 2004 13:45:14 +0200
From: SecuriTeam <[email protected]>
To: [email protected]Subject: [NT] TwinFTP Server Directory Traversal Vulnerability
The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion
The SecuriTeam alerts list - Free, Accurate, Independent.
Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html
- - - - - - - - -
TwinFTP Server Directory Traversal Vulnerability
------------------------------------------------------------------------
SUMMARY
<http://www.twinftp.com/> TwinFTP Server is an FTP server released by
Jigunet Corporation for the Windows platform.
A vulnerability exists in TwinFTP server that allows a malicious user
access files outside the FTP directory. This vulnerability may also be
exploited to bypass directory restrictions enforced by the FTP server to
write arbitrary files into directories that the server process has access
to.
DETAILS
Vulnerable Systems:
* TwinFTP Server Standard Version 1.0.3 R2 (Win32)
* TwinFTP Server Enterprise Version 1.0.3 R2 (Win32)
* TwinFTP Server Standard/Enterprise Version 1.0.3 R3 released before 10
Sep 2004
Immune Systems:
* TwinFTP Server Standard Version 1.0.3 R3 (Win32), released on 10 Sep
2004. is vulnerable.
A directory traversal vulnerability exists in several FTP commands of
TwinFTP that may be exploited by a malicious user to access files outside
the FTP directory. The problem lies with the incorrect filtering of
directory name supplied to CWD, STOR and RETR commands. Directory
traversal is possible when the directory name contains three dots and a
forward slash, e.g. ".../winnt".
This vulnerability may be exploited to bypass directory restrictions
enforced by the FTP server to write arbitrary files into directories that
the server process has access to. This is critical since it may be abused
by malicious users to overwrite system files within the Windows directory
if the TwinFTP server runs with Administrator privilege.
Solution:
Upgrade to Version 1.0.3 R3 that is released on 10 September 2004. Version
1.0.3 R3 which was released before 10 September 2004 is partially
vulnerable in RETR and STOR commands.
Disclosure Timeline:
02 Aug 04 - Vulnerability Discovered
04 Aug 04 - Initial Vendor Notification (no reply)
09 Aug 04 - Second Vendor Notification
13 Aug 04 - Vendor released Version 1.0.3 R3 which fixes directory
traversal problem, but RETR and STOR commands are still vulnerable.
13 Aug 04 - Notified vendor about RETR and STOR vulnerability (no reply)
30 Aug 04 - Second vendor notification about RETR and STOR vulnerability
10 Sep 04 - Vendor re-released Version 1.0.3 R3 which fixes RETR and STOR
commands.
12 Sep 04 - Public Release
ADDITIONAL INFORMATION
The information has been provided by <mailto:[email protected]>
Chew Keong TAN.
The original article can be found at:
<http://www.security.org.sg/vuln/twinftp103r2.html>
http://www.security.org.sg/vuln/twinftp103r2.html
This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: [email protected]
In order to subscribe to the mailing list, simply forward this email to: [email protected]
DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.