ID

VAR-200911-0246


CVE

CVE-2009-4053


TITLE

Home FTP Server  directory traversal vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2009-003909

DESCRIPTION

Multiple directory traversal vulnerabilities in Home FTP Server 1.10.1.139 allow remote authenticated users to (1) create arbitrary directories via directory traversal sequences in an MKD command or (2) create files with any contents in arbitrary directories via directory traversal sequences in a file upload request. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. Home Ftp Server is an easy to use FTP server. Home FTP Server does not properly filter the input provided by the user in the MKD command. The authenticated user can create a directory outside the FTP root directory by following the steps below: 1.sock.connect((hostname, 21))2.sock. Send(\"user %s\" %username)3.sock.send(\"pass %s\" %passwd)4.sock.send(\"MKD ../A\")5.sock.close(). Successful exploits will allow the attacker to obtain sensitive information. ---------------------------------------------------------------------- Do you have VARM strategy implemented? (Vulnerability Assessment Remediation Management) If not, then implement it through the most reliable vulnerability intelligence source on the market. Implement it through Secunia. For more information visit: http://secunia.com/advisories/business_solutions/ Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com ---------------------------------------------------------------------- TITLE: Home FTP Server "SITE INDEX" Denial of Service SECUNIA ADVISORY ID: SA37381 VERIFY ADVISORY: http://secunia.com/advisories/37381/ DESCRIPTION: A vulnerability has been discovered in Home FTP Server, which can be exploited by malicious users to cause a DoS (Denial of Service). The vulnerability is caused due to an error in the handling of multiple "SITE INDEX" commands and can be exploited to stop the server. The vulnerability is confirmed in version 1.10.1.139. SOLUTION: Restrict access to trusted users only. PROVIDED AND/OR DISCOVERED BY: zhangmc ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.79

sources: NVD: CVE-2009-4053 // JVNDB: JVNDB-2009-003909 // CNVD: CNVD-2009-5724 // BID: 37041 // BID: 37228 // PACKETSTORM: 82705

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2009-5724

AFFECTED PRODUCTS

vendor:downstairs dnsaliasmodel:home ftp serverscope:eqversion:1.10.1.139

Trust: 1.4

vendor:home ftp servermodel:home ftp serverscope:eqversion:1.10.1.139

Trust: 1.0

vendor:downstairs dnsaliasmodel:home ftp serverscope:eqversion: -

Trust: 0.8

vendor:nomodel: - scope: - version: -

Trust: 0.6

vendor:homemodel:ftp server home ftp serverscope:eqversion:1.10.1.139

Trust: 0.3

vendor:ashleymodel:brown iweb serverscope:eqversion:0

Trust: 0.3

sources: CNVD: CNVD-2009-5724 // BID: 37041 // BID: 37228 // JVNDB: JVNDB-2009-003909 // CNNVD: CNNVD-200911-236 // NVD: CVE-2009-4053

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2009-4053
value: MEDIUM

Trust: 1.0

NVD: CVE-2009-4053
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2009-5724
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-200911-236
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2009-4053
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2009-5724
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2009-4053
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2009-4053
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2009-5724 // JVNDB: JVNDB-2009-003909 // CNNVD: CNNVD-200911-236 // NVD: CVE-2009-4053

PROBLEMTYPE DATA

problemtype:CWE-22

Trust: 1.0

problemtype:Path traversal (CWE-22) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2009-003909 // NVD: CVE-2009-4053

THREAT TYPE

network

Trust: 0.6

sources: BID: 37041 // BID: 37228

TYPE

Input Validation Error

Trust: 0.6

sources: BID: 37041 // BID: 37228

PATCH

title:Top Pageurl:http://downstairs.dnsalias.net/homeftpserver.html

Trust: 0.8

sources: JVNDB: JVNDB-2009-003909

EXTERNAL IDS

db:NVDid:CVE-2009-4053

Trust: 3.8

db:SECUNIAid:37381

Trust: 1.7

db:BIDid:37041

Trust: 0.9

db:JVNDBid:JVNDB-2009-003909

Trust: 0.8

db:CNVDid:CNVD-2009-5724

Trust: 0.6

db:CNNVDid:CNNVD-200911-236

Trust: 0.6

db:BIDid:37228

Trust: 0.3

db:PACKETSTORMid:82705

Trust: 0.1

sources: CNVD: CNVD-2009-5724 // BID: 37041 // BID: 37228 // JVNDB: JVNDB-2009-003909 // PACKETSTORM: 82705 // CNNVD: CNNVD-200911-236 // NVD: CVE-2009-4053

REFERENCES

url:http://secunia.com/advisories/37381

Trust: 1.6

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/54303

Trust: 1.0

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-4053

Trust: 0.8

url:http://marc.info/?l=bugtraq&m=125847643300561&w=2

Trust: 0.6

url:http://downstairs.dnsalias.net/homeftpserver.html

Trust: 0.3

url:/archive/1/507932

Trust: 0.3

url:http://www.ashleybrown.co.uk/iweb/

Trust: 0.3

url:http://secunia.com/advisories/37381/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/business_solutions/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: CNVD: CNVD-2009-5724 // BID: 37041 // BID: 37228 // JVNDB: JVNDB-2009-003909 // PACKETSTORM: 82705 // CNNVD: CNNVD-200911-236 // NVD: CVE-2009-4053

CREDITS

zhangmc@mail.ustc.edu.cn

Trust: 0.3

sources: BID: 37041

SOURCES

db:CNVDid:CNVD-2009-5724
db:BIDid:37041
db:BIDid:37228
db:JVNDBid:JVNDB-2009-003909
db:PACKETSTORMid:82705
db:CNNVDid:CNNVD-200911-236
db:NVDid:CVE-2009-4053

LAST UPDATE DATE

2025-04-10T23:03:00.745000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2009-5724date:2014-01-27T00:00:00
db:BIDid:37041date:2009-11-25T21:55:00
db:BIDid:37228date:2009-12-09T16:04:00
db:JVNDBid:JVNDB-2009-003909date:2024-02-22T07:23:00
db:CNNVDid:CNNVD-200911-236date:2009-11-23T00:00:00
db:NVDid:CVE-2009-4053date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:CNVDid:CNVD-2009-5724date:2009-11-17T00:00:00
db:BIDid:37041date:2009-11-17T00:00:00
db:BIDid:37228date:2009-12-07T00:00:00
db:JVNDBid:JVNDB-2009-003909date:2012-06-26T00:00:00
db:PACKETSTORMid:82705date:2009-11-17T16:47:40
db:CNNVDid:CNNVD-200911-236date:2009-11-23T00:00:00
db:NVDid:CVE-2009-4053date:2009-11-23T17:30:00.767