Directory traversal vulnerability in WinFrigate Frigate 3 FTP client 3.36 and earlier allows remote FTP servers to overwrite arbitrary files via a "..\" (dot dot backslash) in a filename.
Vector
NETWORK
Complexity
MEDIUM
Authentication
NONE
Confidentiality
COMPLETE
Integrity
COMPLETE
Availability
COMPLETE
Winfrigate Frigate 3 3.19 (not an official CPE)
Winfrigate Frigate 3 3.28 (not an official CPE)
Winfrigate Frigate 3 3.18 (not an official CPE)
Winfrigate Frigate 3 3.27 (not an official CPE)
Winfrigate Frigate 3 3.17 (not an official CPE)
Winfrigate Frigate 3 3.29 (not an official CPE)
Winfrigate Frigate 3 3.21 (not an official CPE)
Winfrigate Frigate 3 3.30 (not an official CPE)
Winfrigate Frigate 3 3.22 (not an official CPE)
Winfrigate Frigate 3 3.31 (not an official CPE)
Winfrigate Frigate 3 3.32 (not an official CPE)
Winfrigate Frigate 3 3.20 (not an official CPE)
Winfrigate Frigate 3 3.33 (not an official CPE)
Winfrigate Frigate 3 3.34 (not an official CPE)
Winfrigate Frigate 3 3.25 (not an official CPE)
Winfrigate Frigate 3 3.35 (not an official CPE)
Winfrigate Frigate 3 3.26 (not an official CPE)
Winfrigate Frigate 3 3.23 (not an official CPE)
Winfrigate Frigate 3 3.36 (not an official CPE)
Winfrigate Frigate 3 3.24 (not an official CPE)
Advisory | Patch | Confirmed | Link |
---|---|---|---|
http://www.htbridge.ch/advisory/directory_traversal_in_f... | |||
40898 |
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (ID 22)
Related CAPEC 7
Relative Path Traversal (CAPEC-ID 139)
Directory Traversal (CAPEC-ID 213)
File System Function Injection, Content Based (CAPEC-ID 23)
Using Slashes and URL Encoding Combined to Bypass Validation Logic (CAPEC-ID 64)
Manipulating Input to File System Calls (CAPEC-ID 76)
Using Escaped Slashes in Alternate Encoding (CAPEC-ID 78)
Using Slashes in Alternate Encoding (CAPEC-ID 79)