RaidenFTPD urlget Command Traversal Arbitrary File Access

Medium Nessus Plugin ID 18225


The remote FTP server has a directory traversal vulnerability.


The remote host is running the RaidenFTPD FTP server. This version has a directory traversal vulnerability that could allow an attacker to read arbitrary files outside of the intended FTP root.


Upgrade to RaidenFTPD 2.4 build 2241 or later.

See Also

Plugin Details

Severity: Medium

ID: 18225

File Name: raidenftpd_file_access.nasl

Version: $Revision: 1.16 $

Type: remote

Family: FTP

Published: 2005/05/11

Modified: 2016/11/17

Dependencies: 10092, 10079

Risk Information

Risk Factor: Medium


Base Score: 5

Temporal Score: 4.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Temporal Vector: CVSS2#E:H/RL:OF/RC:C

Vulnerability Information

Required KB Items: ftp/login

Exploit Available: true

Exploit Ease: No exploit is required

Exploited by Nessus: true

Vulnerability Publication Date: 2005/05/02

Reference Information

CVE: CVE-2005-1480

BID: 13292

OSVDB: 15713