| Summary | Multiple directory traversal vulnerabilities in sitenfo.sh, sitezipchk.sh, and siteziplist.sh in Glftpd 1.26 to 2.00 allow remote authenticated users to (1) determine the existence of arbitrary files, (2) list files in restricted directories, or (3) read arbitrary files from within ZIP or gzip files, via .. (dot dot) sequences and globbing ("*") characters in a SITE NFO command. |
|---|---|
| Publication Date | March 30, 2005, 2 p.m. |
| Registration Date | Jan. 29, 2021, 5:58 p.m. |
| Last Update | July 11, 2017, 10:32 a.m. |
| CVSS2.0 : MEDIUM | |
| Score | 5.0 |
|---|---|
| Vector | AV:N/AC:L/Au:N/C:P/I:N/A:N |
| 攻撃元区分(AV) | ネットワーク |
| 攻撃条件の複雑さ(AC) | 低 |
| 攻撃前の認証要否(Au) | 不要 |
| 機密性への影響(C) | 低 |
| 完全性への影響(I) | なし |
| 可用性への影響(A) | なし |
| Get all privileges. | いいえ |
| Get user privileges | いいえ |
| Get other privileges | いいえ |
| User operation required | いいえ |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:a:glftpd:glftpd:1.26:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:glftpd:glftpd:1.27:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:glftpd:glftpd:1.28:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:glftpd:glftpd:1.29.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:glftpd:glftpd:1.31:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:glftpd:glftpd:1.32:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:glftpd:glftpd:2.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:glftpd:glftpd:2.0_rc1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:glftpd:glftpd:2.0_rc2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:glftpd:glftpd:2.0_rc3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:glftpd:glftpd:2.0_rc4:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:glftpd:glftpd:2.0_rc5:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:glftpd:glftpd:2.0_rc6:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:glftpd:glftpd:2.0_rc7:*:*:*:*:*:*:* | |||||