CVE-2017-7418
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
ProFTPD before 1.3.5e and 1.3.6 before 1.3.6rc5 controls whether the home directory of a user could contain a symbolic link through the AllowChrootSymlinks configuration option, but checks only the last path component when enforcing AllowChrootSymlinks. Attackers with local access could bypass the AllowChrootSymlinks control by replacing a path component (other than the last one) with a symbolic link. The threat model includes an attacker who is not granted full filesystem access by a hosting provider, but can reconfigure the home directory of an FTP user.
ProFTPD en versiones anteriores a 1.3.5e y 1.3.6 en versiones anteriores a 1.3.6rc5 controlan si el directorio de inicio de un usuario puede contener un enlace simbólico hasta la versión de la opción de configuración AllowChrootSymlinks, pero comprueba sólo el último componente de ruta al aplicar AllowChrootSymlinks. Los atacantes con acceso local pueden omitir el control AllowChrootSymlinks reemplazando un componente de ruta (que no sea el último) con un enlace simbólico. El modelo de amenaza incluye un atacante al que no se concede acceso completo al sistema de archivos por parte de un proveedor de alojamiento, pero puede reconfigurar el directorio de inicio de un usuario FTP.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-04-04 CVE Reserved
- 2017-04-04 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-05 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-59: Improper Link Resolution Before File Access ('Link Following')
CAPEC
References (8)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/97409 | Third Party Advisory |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Proftpd Search vendor "Proftpd" | Proftpd Search vendor "Proftpd" for product "Proftpd" | <= 1.3.5 Search vendor "Proftpd" for product "Proftpd" and version " <= 1.3.5" | d |
Affected
| ||||||
Proftpd Search vendor "Proftpd" | Proftpd Search vendor "Proftpd" for product "Proftpd" | 1.3.6 Search vendor "Proftpd" for product "Proftpd" and version "1.3.6" | - |
Affected
| ||||||
Proftpd Search vendor "Proftpd" | Proftpd Search vendor "Proftpd" for product "Proftpd" | 1.3.6 Search vendor "Proftpd" for product "Proftpd" and version "1.3.6" | rc1 |
Affected
| ||||||
Proftpd Search vendor "Proftpd" | Proftpd Search vendor "Proftpd" for product "Proftpd" | 1.3.6 Search vendor "Proftpd" for product "Proftpd" and version "1.3.6" | rc2 |
Affected
| ||||||
Proftpd Search vendor "Proftpd" | Proftpd Search vendor "Proftpd" for product "Proftpd" | 1.3.6 Search vendor "Proftpd" for product "Proftpd" and version "1.3.6" | rc3 |
Affected
| ||||||
Proftpd Search vendor "Proftpd" | Proftpd Search vendor "Proftpd" for product "Proftpd" | 1.3.6 Search vendor "Proftpd" for product "Proftpd" and version "1.3.6" | rc4 |
Affected
|