Vulnerability Description
Directory traversal vulnerability in Core FTP Server 1.2 before build 515 allows remote authenticated users to determine the existence of arbitrary files via a /../ sequence in an XCRC command.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Coreftp | Core Ftp | 1.2 |
Related Weaknesses (CWE)
References
- http://coreftp.com/forums/viewtopic.php?t=2985707Vendor Advisory
- http://packetstormsecurity.com/files/125073/Core-FTP-Server-1.2-DoS-Traversal-DiExploit
- http://seclists.org/fulldisclosure/2014/Feb/39Exploit
- http://secunia.com/advisories/56850Vendor Advisory
- http://www.osvdb.org/102967
- http://coreftp.com/forums/viewtopic.php?t=2985707Vendor Advisory
- http://packetstormsecurity.com/files/125073/Core-FTP-Server-1.2-DoS-Traversal-DiExploit
- http://seclists.org/fulldisclosure/2014/Feb/39Exploit
- http://secunia.com/advisories/56850Vendor Advisory
- http://www.osvdb.org/102967
FAQ
What is CVE-2014-1442?
CVE-2014-1442 is a vulnerability with a CVSS score of 4.0 (MEDIUM). Directory traversal vulnerability in Core FTP Server 1.2 before build 515 allows remote authenticated users to determine the existence of arbitrary files via a /../ sequence in an XCRC command.
How severe is CVE-2014-1442?
CVE-2014-1442 has been rated MEDIUM with a CVSS base score of 4.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-1442?
Check the references section above for vendor advisories and patch information. Affected products include: Coreftp Core Ftp.