Monsta FTP 2.10.1 or below is prone to a server-side request forgery vulnerability due to insufficient restriction of the web fetch functionality. This allows attackers to read arbitrary local files and interact with arbitrary third-party services.
References
Link | Resource |
---|---|
https://github.com/sbaresearch/advisories/tree/public/2019/SBA-ADV-20191203-02_Monsta_FTP_Server-Side_Request_Forgery | Third Party Advisory |
https://www.monstaftp.com/notes/ | Release Notes Vendor Advisory |
https://github.com/sbaresearch/advisories/tree/public/2019/SBA-ADV-20191203-02_Monsta_FTP_Server-Side_Request_Forgery | Third Party Advisory |
https://www.monstaftp.com/notes/ | Release Notes Vendor Advisory |
Configurations
History
21 Nov 2024, 05:02
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/sbaresearch/advisories/tree/public/2019/SBA-ADV-20191203-02_Monsta_FTP_Server-Side_Request_Forgery - Third Party Advisory | |
References | () https://www.monstaftp.com/notes/ - Release Notes, Vendor Advisory |
Information
Published : 2020-07-01 17:15
Updated : 2024-11-21 05:02
NVD link : CVE-2020-14056
Mitre link : CVE-2020-14056
CVE.ORG link : CVE-2020-14056
JSON object : View
Products Affected
monstaftp
- monsta_ftp
CWE
CWE-918
Server-Side Request Forgery (SSRF)