- Description
- ProFTPD before 1.3.5e and 1.3.6 before 1.3.6rc5 controls whether the home directory of a user could contain a symbolic link through the AllowChrootSymlinks configuration option, but checks only the last path component when enforcing AllowChrootSymlinks. Attackers with local access could bypass the AllowChrootSymlinks control by replacing a path component (other than the last one) with a symbolic link. The threat model includes an attacker who is not granted full filesystem access by a hosting provider, but can reconfigure the home directory of an FTP user.
- Source
- cve@mitre.org
- NVD status
- Modified
CVSS 3.0
- Type
- Primary
- Base score
- 5.5
- Impact score
- 3.6
- Exploitability score
- 1.8
- Vector string
- CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 2.1
- Impact score
- 2.9
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:N/I:P/A:N
- nvd@nist.gov
- CWE-59
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:proftpd:proftpd:*:d:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "17E56F7D-3F37-44E2-9ADB-24F06125A5A4",
"versionEndIncluding": "1.3.5"
},
{
"criteria": "cpe:2.3:a:proftpd:proftpd:1.3.6:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "40A2C657-27EB-475E-9591-99E03DBDA12B"
},
{
"criteria": "cpe:2.3:a:proftpd:proftpd:1.3.6:rc1:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "B6475817-8CC7-4C0C-A9A6-E58189852DA2"
},
{
"criteria": "cpe:2.3:a:proftpd:proftpd:1.3.6:rc2:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "84CB8C28-C432-4FD4-9B76-CA6C2C8824D9"
},
{
"criteria": "cpe:2.3:a:proftpd:proftpd:1.3.6:rc3:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "21D053B1-AFDE-4859-ACFB-C51DC28EAA04"
},
{
"criteria": "cpe:2.3:a:proftpd:proftpd:1.3.6:rc4:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "AA9A0785-FF92-4AB0-8F42-9060FB24120E"
}
],
"operator": "OR"
}
]
}
]