File Transfer 1.2 - Request File Directory Traversal

EDB-ID:

31536


Author:

teeed

Type:

remote


Platform:

Windows

Date:

2007-11-10


source: https://www.securityfocus.com/bid/28453/info

File Transfer is prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input data.

Exploiting this issue allows an attacker to access arbitrary files outside of the application's root directory. This can expose sensitive information that could help the attacker launch further attacks.

This issue affects versions prior to File Transfer 1.2f. 

../../../../../../../boot.ini