The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[NT] TwinFTP Server Directory Traversal Vulnerability


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: 14 Sep 2004 13:45:14 +0200
From: SecuriTeam <[email protected]>
To: [email protected]
Subject: [NT] TwinFTP Server Directory Traversal Vulnerability

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -



  TwinFTP Server Directory Traversal Vulnerability
------------------------------------------------------------------------


SUMMARY

 <http://www.twinftp.com/>; TwinFTP Server is an FTP server released by 
Jigunet Corporation for the Windows platform.

A vulnerability exists in TwinFTP server that allows a malicious user 
access files outside the FTP directory. This vulnerability may also be 
exploited to bypass directory restrictions enforced by the FTP server to 
write arbitrary files into directories that the server process has access 
to.

DETAILS

Vulnerable Systems:
 * TwinFTP Server Standard Version 1.0.3 R2 (Win32)
 * TwinFTP Server Enterprise Version 1.0.3 R2 (Win32)
 * TwinFTP Server Standard/Enterprise Version 1.0.3 R3 released before 10 
Sep 2004

Immune Systems:
 * TwinFTP Server Standard Version 1.0.3 R3 (Win32), released on 10 Sep 
2004. is vulnerable.

A directory traversal vulnerability exists in several FTP commands of 
TwinFTP that may be exploited by a malicious user to access files outside 
the FTP directory. The problem lies with the incorrect filtering of 
directory name supplied to CWD, STOR and RETR commands. Directory 
traversal is possible when the directory name contains three dots and a 
forward slash, e.g. ".../winnt".
This vulnerability may be exploited to bypass directory restrictions 
enforced by the FTP server to write arbitrary files into directories that 
the server process has access to. This is critical since it may be abused 
by malicious users to overwrite system files within the Windows directory 
if the TwinFTP server runs with Administrator privilege.

Solution:
Upgrade to Version 1.0.3 R3 that is released on 10 September 2004. Version 
1.0.3 R3 which was released before 10 September 2004 is partially 
vulnerable in RETR and STOR commands.

Disclosure Timeline:
02 Aug 04 - Vulnerability Discovered
04 Aug 04 - Initial Vendor Notification (no reply)
09 Aug 04 - Second Vendor Notification
13 Aug 04 - Vendor released Version 1.0.3 R3 which fixes directory 
traversal problem, but RETR and STOR commands are still vulnerable.
13 Aug 04 - Notified vendor about RETR and STOR vulnerability (no reply)
30 Aug 04 - Second vendor notification about RETR and STOR vulnerability
10 Sep 04 - Vendor re-released Version 1.0.3 R3 which fixes RETR and STOR 
commands.
12 Sep 04 - Public Release


ADDITIONAL INFORMATION

The information has been provided by  <mailto:[email protected]> 
Chew Keong TAN.
The original article can be found at:  
<http://www.security.org.sg/vuln/twinftp103r2.html>; 
http://www.security.org.sg/vuln/twinftp103r2.html




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру