4 results (0.004 seconds)

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 1

01 Aug 2018 — It has been discovered that lftp up to and including version 4.8.3 does not properly sanitize remote file names, leading to a loss of integrity on the local system when reverse mirroring is used. A remote attacker may trick a user to use reverse mirroring on an attacker controlled FTP server, resulting in the removal of all files in the current working directory of the victim's system. Se ha descubierto que lftp hasta e incluyendo la versión 4.8.3 no sanea adecuadamente los nombres de archivo remoto, lo que... • http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00036.html • CWE-20: Improper Input Validation •

CVSS: 9.8EPSS: 2%CPEs: 142EXPL: 0

06 Jul 2010 — The get1 command, as used by lftpget, in LFTP before 4.0.6 does not properly validate a server-provided filename before determining the destination filename of a download, which allows remote servers to create or overwrite arbitrary files via a Content-Disposition header that suggests a crafted filename, and possibly execute arbitrary code as a consequence of writing to a dotfile in a home directory. El comando get1, como el usado por lftpget, en LFTP anterior v4.0.6 no valida adecuadamente el nombre de fic... • http://lftp.yar.ru/news.html • CWE-20: Improper Input Validation •

CVSS: 9.8EPSS: 2%CPEs: 1EXPL: 0

27 Apr 2007 — mirror --script in lftp before 3.5.9 does not properly quote shell metacharacters, which might allow remote user-assisted attackers to execute shell commands via a malicious script. NOTE: it is not clear whether this issue crosses security boundaries, since the script already supports commands such as "get" which could overwrite executable files. La secuencia de comandos mirror en lftp anterior a 3.5.9 no cita adecaudamente el interprete de carácteres metacaracter, lo cual podría permitir atacantes con la i... • http://bugs.gentoo.org/show_bug.cgi?id=173524 •

CVSS: 9.8EPSS: 15%CPEs: 11EXPL: 1

17 Dec 2003 — Buffer overflows in (1) try_netscape_proxy and (2) try_squid_eplf for lftp 2.6.9 and earlier allow remote HTTP servers to execute arbitrary code via long directory names that are processed by the ls or rels commands. Desbordamiento de búfer en try_netscape_proxy y try_squid_eplf en lftp 2.6.9 y anteriores permite a servidores HTTP remotos ejecutar código arbitrario mediante nombres de directorio largos que son procesados por los comandos ls o rels. • https://www.exploit-db.com/exploits/143 •