Description
Directory traversal vulnerability in RaidenFTPD before 2.4.2241 allows remote attackers to read arbitrary files via a "..\\" (dot dot backslash) in the urlget site command.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Lachlan. H · textremotewindows
https://www.exploit-db.com/exploits/25486
References (6)
Core 6
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/13292
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/15713
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=111507556127582&w=2
Various Sources x_refsource_confirm
http://forum.raidenftpd.com/showflat.php?Board=UBB13&Number=45685
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/20368
Patch third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/15037
Scores
EPSS
0.0794
EPSS Percentile
92.1%
Details
Status
published
Products (1)
raiden_professional_servers/raidenftpd
< 2.4.2240
Published
May 11, 2005
Tracked Since
Feb 18, 2026