ID

VAR-200903-0481


CVE

CVE-2009-1031


TITLE

Rhino Software Serv-U File Server of FTP Server traversal vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2009-005897

DESCRIPTION

Directory traversal vulnerability in the FTP server in Rhino Software Serv-U File Server 7.0.0.1 through 7.4.0.1 allows remote attackers to create arbitrary directories via a \.. (backslash dot dot) in an MKD request. RhinoSoft Serv-U FTP Server is prone to a directory-traversal vulnerability because the application fails to sufficiently sanitize user-supplied input. Serv-U FTP Server 7.4.0.1 is vulnerable; other versions may also be affected. ---------------------------------------------------------------------- Did you know? Our assessment and impact rating along with detailed information such as exploit code availability, or if an updated patch is released by the vendor, is not part of this mailing-list? Click here to learn more about our commercial solutions: http://secunia.com/advisories/business_solutions/ Click here to trial our solutions: http://secunia.com/advisories/try_vi/ ---------------------------------------------------------------------- TITLE: Serv-U "MKD" Directory Traversal Vulnerability SECUNIA ADVISORY ID: SA34329 VERIFY ADVISORY: http://secunia.com/advisories/34329/ DESCRIPTION: A vulnerability has been discovered in Serv-U, which can be exploited by malicious users to bypass certain security restrictions. The vulnerability is caused due to an error when processing "MKD" commands. The vulnerability is confirmed in version 7.4.0.1. SOLUTION: Restrict access to trusted users only. PROVIDED AND/OR DISCOVERED BY: Jonathan Salwan ORIGINAL ADVISORY: http://milw0rm.com/exploits/8211 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 1.98

sources: NVD: CVE-2009-1031 // JVNDB: JVNDB-2009-005897 // BID: 34125 // PACKETSTORM: 75808

AFFECTED PRODUCTS

vendor:solarwindsmodel:serv-u file serverscope:eqversion:7.3.0.0

Trust: 1.0

vendor:solarwindsmodel:serv-u file serverscope:eqversion:7.2.0.0

Trust: 1.0

vendor:solarwindsmodel:serv-u file serverscope:eqversion:7.1.0.0

Trust: 1.0

vendor:solarwindsmodel:serv-u file serverscope:eqversion:7.1.0.2

Trust: 1.0

vendor:solarwindsmodel:serv-u file serverscope:eqversion:7.0.0.3

Trust: 1.0

vendor:solarwindsmodel:serv-u file serverscope:eqversion:7.0.0.4

Trust: 1.0

vendor:solarwindsmodel:serv-u file serverscope:eqversion:7.1.0.1

Trust: 1.0

vendor:solarwindsmodel:serv-u file serverscope:eqversion:7.0.0.1

Trust: 1.0

vendor:solarwindsmodel:serv-u file serverscope:eqversion:7.0.0.2

Trust: 1.0

vendor:solarwindsmodel:serv-u file serverscope:eqversion:7.4.0.0

Trust: 1.0

vendor:solarwindsmodel:serv-u file serverscope:eqversion:7.4.0.1

Trust: 1.0

vendor:solarwindsmodel:serv-u file serverscope:eqversion:7.3.0.1

Trust: 1.0

vendor:solarwindsmodel:serv-u file serverscope:eqversion:7.2.0.1

Trust: 1.0

vendor:solarwindsmodel:serv-u file serverscope:eqversion:7.3.0.2

Trust: 1.0

vendor:rhinomodel:serv-u ftp serverscope:eqversion:7.0.0.1 to 7.4.0.1

Trust: 0.8

vendor:serv umodel:serv-uscope:eqversion:7.4.0.1

Trust: 0.6

vendor:serv umodel:serv-uscope:eqversion:7.4.0.0

Trust: 0.6

vendor:serv umodel:serv-uscope:eqversion:7.2.0.0

Trust: 0.6

vendor:serv umodel:serv-uscope:eqversion:7.2.0.1

Trust: 0.6

vendor:serv umodel:serv-uscope:eqversion:7.0.0.2

Trust: 0.6

vendor:serv umodel:serv-uscope:eqversion:7.0.0.3

Trust: 0.6

vendor:serv umodel:serv-uscope:eqversion:7.3.0.0

Trust: 0.6

vendor:serv umodel:serv-uscope:eqversion:7.3.0.1

Trust: 0.6

vendor:serv umodel:serv-uscope:eqversion:7.3.0.2

Trust: 0.6

vendor:serv umodel:serv-uscope:eqversion:7.0.0.1

Trust: 0.6

vendor:rhinomodel:software serv-uscope:eqversion:7.4.0.1

Trust: 0.3

sources: BID: 34125 // JVNDB: JVNDB-2009-005897 // CNNVD: CNNVD-200903-350 // NVD: CVE-2009-1031

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2009-1031
value: HIGH

Trust: 1.0

NVD: CVE-2009-1031
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200903-350
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2009-1031
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:C/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: COMPLETE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

sources: JVNDB: JVNDB-2009-005897 // CNNVD: CNNVD-200903-350 // NVD: CVE-2009-1031

PROBLEMTYPE DATA

problemtype:CWE-22

Trust: 1.8

sources: JVNDB: JVNDB-2009-005897 // NVD: CVE-2009-1031

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200903-350

TYPE

path traversal

Trust: 0.6

sources: CNNVD: CNNVD-200903-350

CONFIGURATIONS

sources: JVNDB: JVNDB-2009-005897

PATCH

title:Top Pageurl:http://www.serv-u.com/

Trust: 0.8

sources: JVNDB: JVNDB-2009-005897

EXTERNAL IDS

db:NVDid:CVE-2009-1031

Trust: 2.7

db:BIDid:34125

Trust: 1.9

db:SECUNIAid:34329

Trust: 1.8

db:EXPLOIT-DBid:8211

Trust: 1.7

db:VUPENid:ADV-2009-0738

Trust: 1.6

db:OSVDBid:52773

Trust: 1.6

db:JVNDBid:JVNDB-2009-005897

Trust: 0.8

db:CNNVDid:CNNVD-200903-350

Trust: 0.6

db:PACKETSTORMid:75808

Trust: 0.1

sources: BID: 34125 // JVNDB: JVNDB-2009-005897 // PACKETSTORM: 75808 // CNNVD: CNNVD-200903-350 // NVD: CVE-2009-1031

REFERENCES

url:http://osvdb.org/52773

Trust: 1.6

url:http://www.vupen.com/english/advisories/2009/0738

Trust: 1.6

url:http://www.securityfocus.com/bid/34125

Trust: 1.6

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/49258

Trust: 1.6

url:http://secunia.com/advisories/34329

Trust: 1.6

url:https://www.exploit-db.com/exploits/8211

Trust: 1.6

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1031

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-1031

Trust: 0.8

url:http://www.serv-u.com/

Trust: 0.3

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/business_solutions/

Trust: 0.1

url:http://secunia.com/advisories/try_vi/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/34329/

Trust: 0.1

url:http://milw0rm.com/exploits/8211

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: BID: 34125 // JVNDB: JVNDB-2009-005897 // PACKETSTORM: 75808 // CNNVD: CNNVD-200903-350 // NVD: CVE-2009-1031

CREDITS

Jonathan Salwan submit@shell-storm.org

Trust: 0.6

sources: CNNVD: CNNVD-200903-350

SOURCES

db:BIDid:34125
db:JVNDBid:JVNDB-2009-005897
db:PACKETSTORMid:75808
db:CNNVDid:CNNVD-200903-350
db:NVDid:CVE-2009-1031

LAST UPDATE DATE

2024-11-23T22:57:01.239000+00:00


SOURCES UPDATE DATE

db:BIDid:34125date:2009-11-20T17:05:00
db:JVNDBid:JVNDB-2009-005897date:2012-12-20T00:00:00
db:CNNVDid:CNNVD-200903-350date:2020-07-29T00:00:00
db:NVDid:CVE-2009-1031date:2024-11-21T01:01:29.853

SOURCES RELEASE DATE

db:BIDid:34125date:2009-03-16T00:00:00
db:JVNDBid:JVNDB-2009-005897date:2012-12-20T00:00:00
db:PACKETSTORMid:75808date:2009-03-17T05:41:47
db:CNNVDid:CNNVD-200903-350date:2009-03-20T00:00:00
db:NVDid:CVE-2009-1031date:2009-03-20T00:30:00.717