7.5
CVSSv2

CVE-2010-2251

Published: 06/07/2010 Updated: 10/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The get1 command, as used by lftpget, in LFTP prior to 4.0.6 does not properly validate a server-provided filename before determining the destination filename of a download, which allows remote servers to create or overwrite arbitrary files via a Content-Disposition header that suggests a crafted filename, and possibly execute arbitrary code as a consequence of writing to a dotfile in a home directory.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.
Vulnerable Product Search on Vulmon Subscribe to Product

alexander v. lukyanov lftp 2.0.0

alexander v. lukyanov lftp 2.0.1

alexander v. lukyanov lftp 2.0.2

alexander v. lukyanov lftp 2.0.3

alexander v. lukyanov lftp 2.0.4

alexander v. lukyanov lftp 2.0.5

alexander v. lukyanov lftp 2.1.0

alexander v. lukyanov lftp 2.1.1

alexander v. lukyanov lftp 2.1.2

alexander v. lukyanov lftp 2.1.3

alexander v. lukyanov lftp 2.1.4

alexander v. lukyanov lftp 2.1.5

alexander v. lukyanov lftp 2.1.6

alexander v. lukyanov lftp 2.1.7

alexander v. lukyanov lftp 2.1.8

alexander v. lukyanov lftp 2.1.9

alexander v. lukyanov lftp 2.1.10

alexander v. lukyanov lftp 2.2.0

alexander v. lukyanov lftp 2.2.0a

alexander v. lukyanov lftp 2.2.1

alexander v. lukyanov lftp 2.2.2

alexander v. lukyanov lftp 2.2.3

alexander v. lukyanov lftp 2.2.4

alexander v. lukyanov lftp 2.2.5

alexander v. lukyanov lftp 2.2.6

alexander v. lukyanov lftp 2.3

alexander v. lukyanov lftp 2.3.0

alexander v. lukyanov lftp 2.3.1

alexander v. lukyanov lftp 2.3.2

alexander v. lukyanov lftp 2.3.3

alexander v. lukyanov lftp 2.3.4

alexander v. lukyanov lftp 2.3.5

alexander v. lukyanov lftp 2.3.6

alexander v. lukyanov lftp 2.3.7

alexander v. lukyanov lftp 2.3.8

alexander v. lukyanov lftp 2.3.9

alexander v. lukyanov lftp 2.3.10

alexander v. lukyanov lftp 2.3.11

alexander v. lukyanov lftp 2.4.0

alexander v. lukyanov lftp 2.4.1

alexander v. lukyanov lftp 2.4.2

alexander v. lukyanov lftp 2.4.3

alexander v. lukyanov lftp 2.4.5

alexander v. lukyanov lftp 2.4.6

alexander v. lukyanov lftp 2.4.7

alexander v. lukyanov lftp 2.4.8

alexander v. lukyanov lftp 2.4.9

alexander v. lukyanov lftp 2.4.10

alexander v. lukyanov lftp 2.4.10a

alexander v. lukyanov lftp 2.5.0

alexander v. lukyanov lftp 2.5.1

alexander v. lukyanov lftp 2.5.2

alexander v. lukyanov lftp 2.5.3

alexander v. lukyanov lftp 2.5.4

alexander v. lukyanov lftp 2.6.0

alexander v. lukyanov lftp 2.6.1

alexander v. lukyanov lftp 2.6.2

alexander v. lukyanov lftp 2.6.3

alexander v. lukyanov lftp 2.6.4

alexander v. lukyanov lftp 2.6.5

alexander v. lukyanov lftp 2.6.6

alexander v. lukyanov lftp 2.6.7

alexander v. lukyanov lftp 2.6.8

alexander v. lukyanov lftp 2.6.9

alexander v. lukyanov lftp 2.6.10

alexander v. lukyanov lftp 2.6.11

alexander v. lukyanov lftp 2.6.12

alexander v. lukyanov lftp 3.0.0

alexander v. lukyanov lftp 3.0.1

alexander v. lukyanov lftp 3.0.2

alexander v. lukyanov lftp 3.0.3

alexander v. lukyanov lftp 3.0.4

alexander v. lukyanov lftp 3.0.5

alexander v. lukyanov lftp 3.0.6

alexander v. lukyanov lftp 3.0.7

alexander v. lukyanov lftp 3.0.8

alexander v. lukyanov lftp 3.0.9

alexander v. lukyanov lftp 3.0.10

alexander v. lukyanov lftp 3.0.11

alexander v. lukyanov lftp 3.0.12

alexander v. lukyanov lftp 3.0.13

alexander v. lukyanov lftp 3.1.0

alexander v. lukyanov lftp 3.1.1

alexander v. lukyanov lftp 3.1.2

alexander v. lukyanov lftp 3.1.3

alexander v. lukyanov lftp 3.2.0

alexander v. lukyanov lftp 3.2.1

alexander v. lukyanov lftp 3.3.0

alexander v. lukyanov lftp 3.3.1

alexander v. lukyanov lftp 3.3.2

alexander v. lukyanov lftp 3.3.3

alexander v. lukyanov lftp 3.3.4

alexander v. lukyanov lftp 3.3.5

alexander v. lukyanov lftp 3.4.0

alexander v. lukyanov lftp 3.4.1

alexander v. lukyanov lftp 3.4.2

alexander v. lukyanov lftp 3.4.3

alexander v. lukyanov lftp 3.4.4

alexander v. lukyanov lftp 3.4.5

alexander v. lukyanov lftp 3.4.6

alexander v. lukyanov lftp 3.4.7

alexander v. lukyanov lftp 3.5.0

alexander v. lukyanov lftp 3.5.1

alexander v. lukyanov lftp 3.5.2

alexander v. lukyanov lftp 3.5.3

alexander v. lukyanov lftp 3.5.4

alexander v. lukyanov lftp 3.5.5

alexander v. lukyanov lftp 3.5.6

alexander v. lukyanov lftp 3.5.7

alexander v. lukyanov lftp 3.5.8

alexander v. lukyanov lftp 3.5.9

alexander v. lukyanov lftp 3.5.10

alexander v. lukyanov lftp 3.5.11

alexander v. lukyanov lftp 3.5.12

alexander v. lukyanov lftp 3.5.13

alexander v. lukyanov lftp 3.5.14

alexander v. lukyanov lftp 3.5.15

alexander v. lukyanov lftp 3.6.0

alexander v. lukyanov lftp 3.6.1

alexander v. lukyanov lftp 3.6.2

alexander v. lukyanov lftp 3.6.3

alexander v. lukyanov lftp 3.7.0

alexander v. lukyanov lftp 3.7.1

alexander v. lukyanov lftp 3.7.2

alexander v. lukyanov lftp 3.7.3

alexander v. lukyanov lftp 3.7.4

alexander v. lukyanov lftp 3.7.5

alexander v. lukyanov lftp 3.7.6

alexander v. lukyanov lftp 3.7.7

alexander v. lukyanov lftp 3.7.8

alexander v. lukyanov lftp 3.7.9

alexander v. lukyanov lftp 3.7.10

alexander v. lukyanov lftp 3.7.11

alexander v. lukyanov lftp 3.7.12

alexander v. lukyanov lftp 3.7.13

alexander v. lukyanov lftp 3.7.14

alexander v. lukyanov lftp 4.0.0

alexander v. lukyanov lftp 4.0.1

alexander v. lukyanov lftp 4.0.2

alexander v. lukyanov lftp 4.0.3

alexander v. lukyanov lftp 4.0.4

alexander v. lukyanov lftp

Vendor Advisories

Synopsis Moderate: lftp security update Type/Severity Security Advisory: Moderate Topic An updated lftp package that fixes one security issue is now available forRed Hat Enterprise Linux 5The Red Hat Security Response Team has rated this update as having moderatesecurity impact A Common Vulnerability Scor ...
It was discovered that LFTP incorrectly filtered filenames suggested by Content-Disposition headers If a user or automated system were tricked into downloading a file from a malicious site, a remote attacker could create the file with an arbitrary name, such as a dotfile, and possibly run arbitrary code ...