Vulnerabilities > CVE-2005-1480 - Unspecified vulnerability in Raiden Professional Servers Raidenftpd
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
NONE Availability impact
NONE Summary
Directory traversal vulnerability in RaidenFTPD before 2.4.2241 allows remote attackers to read arbitrary files via a "..\\" (dot dot backslash) in the urlget site command.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | RaidenFTPD 2.4 Unauthorized File Access Vulnerability. CVE-2005-1480. Remote exploit for windows platform |
id | EDB-ID:25486 |
last seen | 2016-02-03 |
modified | 2005-04-21 |
published | 2005-04-21 |
reporter | Lachlan. H |
source | https://www.exploit-db.com/download/25486/ |
title | RaidenFTPD 2.4 Unauthorized File Access Vulnerability |
Nessus
NASL family | FTP |
NASL id | RAIDENFTPD_FILE_ACCESS.NASL |
description | The remote host is running the RaidenFTPD FTP server. This version has a directory traversal vulnerability that could allow an attacker to read arbitrary files outside of the intended FTP root. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 18225 |
published | 2005-05-11 |
reporter | This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/18225 |
title | RaidenFTPD urlget Command Traversal Arbitrary File Access |
code |
|