7.8
CVSSv2

CVE-2009-1031

Published: 20/03/2009 Updated: 28/07/2020
CVSS v2 Base Score: 7.8 | Impact Score: 6.9 | Exploitability Score: 10
VMScore: 785
Vector: AV:N/AC:L/Au:N/C:N/I:C/A:N

Vulnerability Summary

Directory traversal vulnerability in the FTP server in Rhino Software Serv-U File Server 7.0.0.1 up to and including 7.4.0.1 allows remote malicious users to create arbitrary directories via a \.. (backslash dot dot) in an MKD request.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

solarwinds serv-u file server 7.0.0.2

solarwinds serv-u file server 7.0.0.3

solarwinds serv-u file server 7.3.0.2

solarwinds serv-u file server 7.4.0.0

solarwinds serv-u file server 7.1.0.1

solarwinds serv-u file server 7.1.0.2

solarwinds serv-u file server 7.2.0.0

solarwinds serv-u file server 7.2.0.1

solarwinds serv-u file server 7.0.0.4

solarwinds serv-u file server 7.1.0.0

solarwinds serv-u file server 7.3.0.1

solarwinds serv-u file server 7.3.0.0

solarwinds serv-u file server 7.0.0.1

solarwinds serv-u file server 7.4.0.1

Exploits

#!/usr/bin/perl # Soft : FTP Serv-U # Version : v7401 # # A vulnerability is caused due to an input validation error when handling FTP "MKD" # requests This can be exploited to escape the FTP root and create arbitrary directory on # the system via directory traversal attacks using the "\" character sequence # # # Author: Jonathan Salwan ...