Vulnerabilities > CVE-2001-0491 - Directory Traversal vulnerability in Team Johnlong Raidenftpd 2.1Build947
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
NONE Availability impact
NONE Summary
Directory traversal vulnerability in RaidenFTPD Server 2.1 before build 952 allows attackers to access files outside the ftp root via dot dot attacks, such as (1) .... in CWD, (2) .. in NLST, or (3) ... in NLST.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | RaidenFTPD 2.1 Directory Traversal Vulnerability. CVE-2001-0491. Remote exploit for windows platform |
id | EDB-ID:20803 |
last seen | 2016-02-02 |
modified | 2001-04-25 |
published | 2001-04-25 |
reporter | joetesta |
source | https://www.exploit-db.com/download/20803/ |
title | raidenftpd 2.1 - Directory Traversal Vulnerability |
Nessus
NASL family | FTP |
NASL id | RAIDENFTPD_DIR_TRAVERSAL.NASL |
description | The remote host is running the RaidenFTPD FTP server. This version has a directory traversal vulnerability. An authenticated attacker could exploit this to read and write arbitrary files outside of the intended FTP root. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 18224 |
published | 2005-05-11 |
reporter | This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/18224 |
title | RaidenFTPD Multiple Command Traversal Arbitrary File Access |
code |
|