exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Titan FTP Server 10.32 Build 1816 Directory Traversals

Titan FTP Server 10.32 Build 1816 Directory Traversals
Posted Feb 11, 2014
Authored by Fara Denise Rustein, Luciano Martins

Titan FTP server version 10.32 Build 1816 suffers from multiple directory traversal vulnerabilities.

tags | exploit, vulnerability, file inclusion
advisories | CVE-2014-1841, CVE-2014-1842, CVE-2014-1843
SHA-256 | ad132145c900e18a6160d6e6bc4f09d22483fb708a41e244c6b8db6f8d8e046c

Titan FTP Server 10.32 Build 1816 Directory Traversals

Change Mirror Download
"Titan FTP Server Directory Traversal Vulnerabilities"

******************************************************************************

- Affected Vendor: South River Technologies
- Affected System: Titan FTP Server software (Version 10.32 Build 1816)
- Vendor Disclosure Date: January 27th, 2014
- Public Disclosure Date: February 10h, 2014
- Vulnerabilities' Status: Fixed

******************************************************************************

Associated CVEs:

1) CVE-2014-1841:
It is possible to copy the complete home folder of another user by leveraging a vulnerability on the Titan FTP Server Web Interface.

2) CVE-2014-1842:
It is possible to obtain the complete list of existing users by writing "/../" on the search bar.

3) CVE-2014-1843:
It is possible to observe the "Properties" for an existing user home folder.
This also allows for enumeration of existing users on the system.

Associated CWE:

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
http://cwe.mitre.org/data/definitions/22.html

******************************************************************************

DESCRIPTIONS
============

1) CVE-2014-1841:

It is possible to copy the complete home folder of another user by leveraging a vulnerability on the Titan FTP Server Web Interface.

This is done by using the "Move" function, and replacing the "src" parameter value with the "/../<folder name of another user>" value.

2) CVE-2014-1842:

It is possible to obtain the complete list of existing users by writing "/../" on the search bar and hitting the "Go" button.

3) CVE-2014-1843:

It is possible to observe the "Properties" for an existing user home folder.

This also allows for enumeration of existing users on the system.

This is done by using the "Properties" function, and replacing the "src" parameter value with the "/../<folder name of another user>" value.

******************************************************************************

- Available fix:
Titan FTP Server software (Version 10.40 Build 1829):
+ titanftp32_10_40_1829_en.exe
+ titanftp64_10_40_1829_en.exe

- Related Links: Deloitte Argentina - www.deloitte.com/ar

- Feedback:
If you have any questions, comments, concerns, updates or suggestions please contact:
+ Fara Rustein
frustein@deloitte.com (Twitter: @fararustein)
+ Luciano Martins
lmartins@deloitte.com (Twitter: @clucianomartins)

******************************************************************************

Credits:

CVE-2014-1841:
1. It is possible to copy the complete home folder of another user by leveraging a vulnerability on the Titan FTP Server Web Interface.
Discovered by Fara Rustein - frustein@deloitte.com

CVE-2014-1842:
2. It is possible to obtain the complete list of existing users by writing "/../" on the search bar.
Discovered by Luciano Martins - lmartins@deloitte.com

CVE-2014-1843:
3. It is also possible to observe the "Properties" for an existing user home folder.
This also allows for enumeration of existing users on the system.
Discovered by Fara Rustein - frustein@deloitte.com

******************************************************************************

Fara Rustein | Senior Consultant
Cyber Security - Deloitte
The key is searching. Vs nfv zphz qsui ghzf zg xhv yvzqy gj tiwap.

 
Deloitte se refiere a una o más de las firmas miembros de Deloitte Touche Tohmatsu Limited, una compañía privada del Reino Unido limitada por garantía, y su red de firmas miembros, cada una como una entidad única e independiente y legalmente separada. Una descripción detallada de la estructura legal de Deloitte Touche Tohmatsu Limited y sus firmas miembros puede verse en el sitio web http://www.deloitte.com/about.                           La información de este mail es confidencial y concierne únicamente a la persona a quien está dirigida. Si este mensaje no está dirigido a usted, por favor tenga presente que no tiene autorización para leer el resto de este e-mail, copiarlo o derivarlo a cualquier otra persona que no sea aquella a quien está dirigido. Si recibe este mail por error, por favor, avise al remitente, luego de lo cual rogamos a usted destruya el mensaje original. No se puede responsabilizar de ningún modo a Deloitte & Co. S.A. ni a sus subsidiarias por cualquier consecuencia o daño que pueda resultar del apropiado y completo envío y recepción del contenido de este e-mail.
 
Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee, and its network of member firms, each of which is a legally separate and independent entity. Please see http://www.deloitte.com/about for a detailed description of the legal structure of Deloitte Touche Tohmatsu Limited and its member firms. 
The information in this e-mail is confidential and intended solely for the person to whom it is addressed. If this message is not addressed to you, please be aware that you have no authorization to read the rest of this e-mail, to copy it or to furnish it to any person other than the addressee. Should you have received this e-mail by mistake, please bring this to the attention of the sender, after which you are kindly requested to destroy the original message. Deloitte & Co. S.A. and subsidiaries cannot be held responsible or liable in any way whatsoever for and/or in connection with any consequences and/or damage resulting from the proper and complete dispatch and receipt of the content of this e-mail.


Login or Register to add favorites

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    66 Files
  • 9
    Oct 9th
    25 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    21 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close