lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CAM-upGpRkoB3utR9nBJ-iiOuw-0bnSqeQ3G3LM2u=vqXUQ8K2Q@mail.gmail.com> Date: Tue, 26 Mar 2019 07:48:54 -0400 From: Kevin R <krandall2013@...il.com> To: fulldisclosure@...lists.org Subject: [FD] CVE-2019-10009 Titan FTP Server Version 2019 Build 3505 Directory Traversal/Local File Inclusion ********************************************************************** Discovered By: Kevin Randall on 3/23/2019 ********************************************************************** A Directory Traversal issue was discovered in the Web GUI in Titan FTP Server 2019 Build 3505. When an authenticated user attempts to preview an uploaded file (through PreviewHandler.ashx) by using a \..\..\ technique, arbitrary files can be loaded in the server response outside the root directory. *********************************************************************** Tools used: Parrot OS Windows 7 32 Bit BurpSuite Browser ************************************************************************* Vulnerability has been fixed in the following build: Build: Titan FTP Server 2019 Build 3515 ************************************************************************** Proof of Concept (PoC): Step 1: Authenticate through Titan FTP Web GUI Step 2: Upload file and attempt to view it Step 3: Intercept requests with BurpSuite when attempting to view uploaded file Step 4: Modify "path=" and "filename=" parameters in the following GET request: Ex: View contents of README.txt file in Python27 directory: Note: You can access other files in directories such as System32, Desktop etc. Payload: ***************************************************************************************** GET /PreviewHandler.ashx?path=\..\..\..\..\Python27\README.txt&filename=README.txt ***************************************************************************************** Step 5: If path is set-up correctly and if file exists, you will receive a 200 OK back from the server. Step 6: View the file through the file preview in the FTP server. ************************************************************************************************** ************************************************************************************************** Timeline: Date Discovered: 3/23/2019 Date Disclosed to Vendor: 3/23/2019 CVE Obtained: 3/24/2019 Vendor Created Patched Version Titan FTP Version 2019 Build 3515: 3/25/2019 Vendor Created Entry in Jira System for issue (SVR-499): 3/25/2019 Date Disclosed: 3/26/2019 ************************************************************************************************** _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists