Plugin ID | 234 |
Plugin name | Jigunet Corporation TwinFTP Server 1.0.3 R2 Directory Traversal |
Plugin filename | Jigunet Corporation TwinFTP Server 1.0.3 R2 Directory Traversal.plugin |
Plugin filesize | 3143 bytes |
Plugin family | FTP |
Plugin created name | Nico 'Triplex' Spicher |
Plugin created email | Triplex at IT-Helpnet dot de |
Plugin created web | http://triplex.it-helpnet.de/ |
Plugin created company | http://www.it-helpnet.de/ |
Plugin created date | 2004/09/13 |
Plugin updated name | Marc Ruef |
Plugin updated email | marc dot ruef at computec dot ch |
Plugin updated web | http://www.computec.ch |
Plugin updated company | computec.ch |
Plugin updated date | 2004/11/13 |
Plugin version | 1.2 |
Plugin changelog | Made some corrections and enhancements in version 1.1. Corrected the plugin structure and added the accuracy values in 1.2 |
Plugin protocol | tcp |
Plugin port | 21 |
Plugin procedure detection | open|sleep|close|pattern_exists 220 TwinFTP Server Standard 1.0.3 R2 (win32) |
Plugin detection accuracy | 80 |
Plugin comment | This plugin was written with the ATK-Plugin-Creator [http://triplex.it-helpnet.de]. |
Bug published name | Tan Chew Keong |
Bug published email | chewkeong@security.org.sg |
Bug published web | http://www.security.org.sg/ |
Bug published company | SIG^2 Vulnerability Research Advisory |
Bug published date | 2004/09/12 |
Bug advisory | http://www.security.org.sg/vuln/twinftp103r2.html |
Bug affected | Jigunet Corporation TwinFTP Server 1.0.3 R2 |
Bug not affected | Jigunet Corporation TwinFTP Server 1.0.3 R3 and newer or other ftp servers |
Bug vulnerability class | Directory Traversal |
Bug description | Tan Chew Keong has reported a vulnerability in Twin FTP Server, which can be exploited by malicious users to access files in arbitrary locations on a vulnerable system. The vulnerability is caused due to an input validation error within the processing of arguments passed via the CWD, STOR and RETR FTP commands. |
Bug solution | Upgrade to Version 1.0.3 R3 that is released on 10 Sep 2004 |
Bug fixing time | Approx. 10 minutes |
Bug exploit availability | Maybe |
Bug remote | Yes |
Bug local | Yes |
Bug severity | High |
Bug popularity | 3 |
Bug simplicity | 7 |
Bug impact | 9 |
Bug risk | 3 |
Source Secunia ID | 12511 |
Source Literature | Hacking Intern - Angriffe, Strategien, Abwehr, Marc Ruef, Marko Rogge, Uwe Velten and Wolfram Gieseke, November 1, 2002, Data Becker, Düsseldorf, ISBN 381582284X |
Source Misc. | http://www.computec.ch |