CVE-2004-1679

Directory traversal vulnerability in TwinFTP 1.0.3 R2 allows remote attackers to create arbitrary files via a .../ (triple dot) in the (1) CWD, (2) STOR, or (3) RETR commands.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:jigunet:twinftp_enterprise:1.0.3_r2:*:*:*:*:*:*:*
cpe:2.3:a:jigunet:twinftp_standard:1.0.3_r2:*:*:*:*:*:*:*

History

20 Nov 2024, 23:51

Type Values Removed Values Added
References () http://marc.info/?l=bugtraq&m=109509243831121&w=2 - () http://marc.info/?l=bugtraq&m=109509243831121&w=2 -
References () http://secunia.com/advisories/12511/ - Vendor Advisory () http://secunia.com/advisories/12511/ - Vendor Advisory
References () http://www.security.org.sg/vuln/twinftp103r2.html - Vendor Advisory () http://www.security.org.sg/vuln/twinftp103r2.html - Vendor Advisory
References () http://www.securityfocus.com/bid/11159 - Patch, Vendor Advisory () http://www.securityfocus.com/bid/11159 - Patch, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/17323 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/17323 -

Information

Published : 2004-08-04 04:00

Updated : 2025-04-03 01:03


NVD link : CVE-2004-1679

Mitre link : CVE-2004-1679

CVE.ORG link : CVE-2004-1679


JSON object : View

Products Affected

jigunet

  • twinftp_standard
  • twinftp_enterprise