TUCoPS :: Crypto :: cesar~1.htm

CesarFTP v0.98b Directory Traversal, Weak Password Encryption
Vulnerability

    CesarFTP

Affected

    CesarFTP v0.98b

Description

    'ByteRage' found following.

    1) Directory Traversal
    ======================
    First, we need a directory where  we have access to on the  victim
    host...  (Or we can create one if we have enough rights)

        ftp://127.0.0.1/

    might give us a directory RESTRICTED/ for example now we do:

        ftp://127.0.0.1/RESTRICTED/...%5c/

    and we're out of the restricted subdirectory, we have read  access
    to the whole harddrive

    2) Weak password encryption
    ===========================
    Once again  an FTP  server with  weak password  encryption...  The
    username:password pairs  are stored  in plaintext  in the  program
    directory (\program  files\CesarFTP\settings.ini).   Combined with
    the directory traversal, the password file can be easily  attained
    by any user...

Solution

    Nothing yet.

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH