CVE-2011-4800

Directory traversal vulnerability in Serv-U FTP Server before 11.1.0.5 allows remote authenticated users to read and write arbitrary files, and list and create arbitrary directories, via a "..:/" (dot dot colon forward slash) in the (1) list, (2) put, or (3) get commands.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:solarwinds:serv-u_file_server:*:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:3.0.0.16:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:3.0.0.17:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:3.1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:3.1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:3.1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:4.0.0.4:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:4.1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:4.1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:5.0.0.0:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:5.0.0.4:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:5.0.0.9:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:5.0.0.11:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:5.1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:5.2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:5.2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:6.0.0.0:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:6.0.0.1:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:6.0.0.2:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:6.1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:6.1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:6.1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:6.1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:6.2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:6.2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:6.3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:6.3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:6.4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:6.4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:6.4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:6.4.0.3:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:6.4.0.4:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:6.4.0.5:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:6.4.0.6:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:7.0.0.1:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:7.0.0.2:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:7.0.0.3:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:7.0.0.4:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:7.1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:7.1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:7.1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:7.2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:7.2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:7.3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:7.3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:7.3.0.2:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:7.4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:7.4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:8.0.0.1:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:8.0.0.2:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:8.0.0.4:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:8.0.0.5:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:8.0.0.7:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:8.1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:8.1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:8.2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:8.2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:8.2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:9.0.0.1:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:9.0.0.3:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:9.0.0.5:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:9.1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:9.1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:9.2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:9.3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:9.4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:9.4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:10.0.0.2:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:10.0.0.3:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:10.0.0.5:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:10.0.0.7:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:10.1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:10.1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:10.2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:10.2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:10.3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:10.4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:10.5.0.4:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:10.5.0.6:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:10.5.0.11:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:10.5.0.14:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:10.5.0.16:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:10.5.0.19:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:10.5.0.21:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:10.5.0.24:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:11.0.0.0:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:11.0.0.2:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:11.0.0.4:*:*:*:*:*:*:*
cpe:2.3:a:solarwinds:serv-u_file_server:11.1.0.5:*:*:*:*:*:*:*

History

21 Nov 2024, 01:33

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/fulldisclosure/2011-11/0454.html - Exploit () http://archives.neohapsis.com/archives/fulldisclosure/2011-11/0454.html - Exploit
References () http://secunia.com/advisories/47021 - Vendor Advisory () http://secunia.com/advisories/47021 - Vendor Advisory
References () http://www.exploit-db.com/exploits/18182 - Exploit () http://www.exploit-db.com/exploits/18182 - Exploit
References () http://www.serv-u.com/releasenotes/ - () http://www.serv-u.com/releasenotes/ -

Information

Published : 2011-12-14 00:55

Updated : 2024-11-21 01:33


NVD link : CVE-2011-4800

Mitre link : CVE-2011-4800

CVE.ORG link : CVE-2011-4800


JSON object : View

Products Affected

solarwinds

  • serv-u_file_server
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')