[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

CVE-2017-7418 -- proftpd-dev

ID: oval:org.secpod.oval:def:1900396Date: (C)2019-02-28   (M)2023-12-20
Class: VULNERABILITYFamily: unix




ProFTPD before 1.3.5e and 1.3.6 before 1.3.6rc5 controls whether the home directory of a user could contain a symbolic link through the AllowChrootSymlinks configuration option, but checks only the last path component when enforcing AllowChrootSymlinks. Attackers with local access could bypass the AllowChrootSymlinks control by replacing a path component with a symbolic link. The threat model includes an attacker who is not granted full filesystem access by a hosting provider, but can reconfigure the home directory of an FTP user.

Platform:
Ubuntu 16.04
Ubuntu 14.04
Product:
proftpd-dev
Reference:
CVE-2017-7418
CVE    1
CVE-2017-7418
CPE    3
cpe:/o:ubuntu:ubuntu_linux:16.04
cpe:/o:ubuntu:ubuntu_linux:14.04
cpe:/a:proftpd:proftpd

© SecPod Technologies