BisonFTP Server Discloses Files on the Server's Disk to Remote Users That Have Write Access on the FTP Server
SecurityTracker Alert ID: 1001907|
SecurityTracker URL: http://securitytracker.com/id/1001907
(Links to External Site)
Date: Jul 2 2001
Disclosure of system information, Disclosure of user information|
Exploit Included: Yes |
ByteRage reported a vulnerability in BisonFTP server that allows remote users with write access to the FTP server to obtain files located anywhere on the same drive thast the server application is installed on.|
A remote user that has write access to the FTP server (including anonymous write access) can upload a *.bdl directory link file. When the remote user changes directory (CD) to that *.bdl file, the FTP server will change to the directory specified in the link file.
The remote user can use this method to browse the entire drive with the same rights as assigned to the user's homedirectory.
The vendor has reportedly been notified.
A remote user with write permissions on the FTP server can traverse the drive that the FTP server is installed on and can retrieve files.|
No solution was available at the time of this entry.|
Vendor URL: www.bisonftp.com/index.htm (Links to External Site)
Access control error, Input validation error|
Windows (Me), Windows (NT), Windows (95), Windows (98), Windows (2000)|
This archive entry has one or more follow-up message(s) listed below.|
Source Message Contents
Date: Mon, 2 Jul 2001 07:23:53 -0700 (PDT)|
Subject: BisonFTP Server V4R1 *.bdl upload Directory Traversal
BisonFTP Server V4R1 *.bdl upload Directory Traversal
Bison FTP Server V4R1
BisonFTP Server V4R1 allows any user to upload *.bdl
(a file format invented to make links to directories)
PUT \local.bdl remote.bdl
(We don't even need to append a dot, we can just
If we create a *.bdl pointing to the harddrive's root
(using our own copy of BisonFTP Server) and we CD to
that link, we can browse the entire drive and we have
the same rights as we have in our homedirectory + we
can dive into subdirs whilst keeping the same rights.
users with write permissions can traverse directories,
by uploading a bdl file pointing to the desired
I have sent this advisory to email@example.com
[ByteRage] firstname.lastname@example.org [www.byterage.cjb.net]
Do You Yahoo!?
Get personalized email addresses from Yahoo! Mail