CVE-2010-3867

Multiple directory traversal vulnerabilities in the mod_site_misc module in ProFTPD before 1.3.3c allow remote authenticated users to create directories, delete directories, create symlinks, and modify file timestamps via directory traversal sequences in a (1) SITE MKDIR, (2) SITE RMDIR, (3) SITE SYMLINK, or (4) SITE UTIME command.
References
Link Resource
http://bugs.proftpd.org/show_bug.cgi?id=3519
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050687.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050703.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050726.html
http://secunia.com/advisories/42047
http://secunia.com/advisories/42052 Vendor Advisory
http://secunia.com/advisories/42217
http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.498209
http://www.debian.org/security/2011/dsa-2191
http://www.mandriva.com/security/advisories?name=MDVSA-2010:227
http://www.openwall.com/lists/oss-security/2010/11/01/4
http://www.proftpd.org/docs/NEWS-1.3.3c
http://www.securityfocus.com/bid/44562 Exploit
http://www.vupen.com/english/advisories/2010/2853
http://www.vupen.com/english/advisories/2010/2941
http://www.vupen.com/english/advisories/2010/2959
http://www.vupen.com/english/advisories/2010/2962
http://bugs.proftpd.org/show_bug.cgi?id=3519
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050687.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050703.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050726.html
http://secunia.com/advisories/42047
http://secunia.com/advisories/42052 Vendor Advisory
http://secunia.com/advisories/42217
http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.498209
http://www.debian.org/security/2011/dsa-2191
http://www.mandriva.com/security/advisories?name=MDVSA-2010:227
http://www.openwall.com/lists/oss-security/2010/11/01/4
http://www.proftpd.org/docs/NEWS-1.3.3c
http://www.securityfocus.com/bid/44562 Exploit
http://www.vupen.com/english/advisories/2010/2853
http://www.vupen.com/english/advisories/2010/2941
http://www.vupen.com/english/advisories/2010/2959
http://www.vupen.com/english/advisories/2010/2962
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:proftpd:proftpd:1.2.10:*:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.2.10:rc1:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.2.10:rc2:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.2.10:rc3:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.0:a:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.0:rc1:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.0:rc2:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.0:rc3:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.0:rc4:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.0:rc5:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.1:rc1:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.1:rc2:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.1:rc3:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.2:*:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.2:a:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.2:b:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.2:c:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.2:d:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.2:e:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.2:rc1:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.2:rc2:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.2:rc3:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.2:rc4:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.3:*:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.3:a:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.3:b:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.3:rc1:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.3:rc2:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.3:rc3:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.3:rc4:*:*:*:*:*:*

History

21 Nov 2024, 01:19

Type Values Removed Values Added
References () http://bugs.proftpd.org/show_bug.cgi?id=3519 - () http://bugs.proftpd.org/show_bug.cgi?id=3519 -
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050687.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050687.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050703.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050703.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050726.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050726.html -
References () http://secunia.com/advisories/42047 - () http://secunia.com/advisories/42047 -
References () http://secunia.com/advisories/42052 - Vendor Advisory () http://secunia.com/advisories/42052 - Vendor Advisory
References () http://secunia.com/advisories/42217 - () http://secunia.com/advisories/42217 -
References () http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.498209 - () http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.498209 -
References () http://www.debian.org/security/2011/dsa-2191 - () http://www.debian.org/security/2011/dsa-2191 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2010:227 - () http://www.mandriva.com/security/advisories?name=MDVSA-2010:227 -
References () http://www.openwall.com/lists/oss-security/2010/11/01/4 - () http://www.openwall.com/lists/oss-security/2010/11/01/4 -
References () http://www.proftpd.org/docs/NEWS-1.3.3c - () http://www.proftpd.org/docs/NEWS-1.3.3c -
References () http://www.securityfocus.com/bid/44562 - Exploit () http://www.securityfocus.com/bid/44562 - Exploit
References () http://www.vupen.com/english/advisories/2010/2853 - () http://www.vupen.com/english/advisories/2010/2853 -
References () http://www.vupen.com/english/advisories/2010/2941 - () http://www.vupen.com/english/advisories/2010/2941 -
References () http://www.vupen.com/english/advisories/2010/2959 - () http://www.vupen.com/english/advisories/2010/2959 -
References () http://www.vupen.com/english/advisories/2010/2962 - () http://www.vupen.com/english/advisories/2010/2962 -

Information

Published : 2010-11-09 21:00

Updated : 2024-11-21 01:19


NVD link : CVE-2010-3867

Mitre link : CVE-2010-3867

CVE.ORG link : CVE-2010-3867


JSON object : View

Products Affected

proftpd

  • proftpd
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')