NA

CVE-2023-24042

Published: 21/01/2023 Updated: 30/01/2023
CVSS v3 Base Score: 7.5 | Impact Score: 5.9 | Exploitability Score: 1.6
VMScore: 0

Vulnerability Summary

A race condition in LightFTP up to and including 2.2 allows an malicious user to achieve path traversal via a malformed FTP request. A handler thread can use an overwritten context->FileName.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

lightftp project lightftp

Github Repositories

INSE6140-Project - Exploring and patching directory traversal vulnerability of LightFTP server LightFTP Directory Traversal Patch This repository contains our work on identifying and patching a directory traversal vulnerability in the LightFTP server, specifically targeted at CVE-2023-24042 Our project was completed as part of the coursework for INSE6140, Winter 2024 About Li

INSE6140-Project - Exploring and patching directory traversal vulnerability of LightFTP server LightFTP Directory Traversal Patch This repository contains our work on identifying and patching a directory traversal vulnerability in the LightFTP server, specifically targeted at CVE-2023-24042 Our project was completed as part of the coursework for INSE6140, Winter 2024 About Li

INSE6140-Project - Exploring and patching directory traversal vulnerability of LightFTP server LightFTP Directory Traversal Patch This repository contains our work on identifying and patching a directory traversal vulnerability in the LightFTP server, specifically targeted at CVE-2023-24042 Our project was completed as part of the coursework for INSE6140, Winter 2024 About Li