First published: Tue Dec 04 2007(Updated: )
Directory traversal vulnerability in index.php in FTP Admin 0.1.0 allows remote authenticated users to include and execute arbitrary local files via a .. (dot dot) in the page parameter. NOTE: in some environments, this can be leveraged for remote file inclusion by using a UNC share pathname or an ftp, ftps, or ssh2.sftp URL.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FTP Admin | =0.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-6233 has been assessed as a medium severity vulnerability due to its potential for local file inclusion by authenticated users.
To mitigate CVE-2007-6233, ensure that access controls restrict authenticated users from exploiting the directory traversal vulnerability and apply any available patches for FTP Admin 0.1.0.
CVE-2007-6233 affects users running FTP Admin version 0.1.0, particularly those with authenticated access.
CVE-2007-6233 is classified as a directory traversal vulnerability that allows unauthorized file access on the server.
Yes, CVE-2007-6233 can potentially be exploited for remote code execution through the inclusion of arbitrary files if certain conditions are met.