XLight FTP Server 3.x SFTP Directory Traversal

medium Nessus Plugin ID 47680

Synopsis

The remote SFTP service is affected by a directory traversal vulnerability.

Description

According to its SSH banner, the version of XLight FTP server listening on the remote host is potentially affected by a directory traversal vulnerability in its SFTP service. A remote, authenticated attacker, exploiting this flaw, can read and modify arbitrary files on the remote host.

Note that this vulnerability only affects XLight FTP server 3.x as the SFTP service was first introduced in version 3.0.

Solution

Upgrade to XLight FTP Server 3.6 or later.

See Also

https://www.securityfocus.com/archive/1/512192/30/0/threaded

http://www.xlightftpd.com/whatsnew.htm

Plugin Details

Severity: Medium

ID: 47680

File Name: xlight_sftp_directory_traversal.nasl

Version: 1.8

Type: remote

Family: Misc.

Published: 7/8/2010

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.5

CVSS v2

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 4.8

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Information

Exploit Ease: No known exploits are available

Patch Publication Date: 7/4/2010

Vulnerability Publication Date: 7/5/2010

Reference Information

CVE: CVE-2010-2695

BID: 41399

Secunia: 40473