First published: Tue Apr 04 2017(Updated: )
ProFTPD before 1.3.5e and 1.3.6 before 1.3.6rc5 controls whether the home directory of a user could contain a symbolic link through the AllowChrootSymlinks configuration option, but checks only the last path component when enforcing AllowChrootSymlinks. Attackers with local access could bypass the AllowChrootSymlinks control by replacing a path component (other than the last one) with a symbolic link. The threat model includes an attacker who is not granted full filesystem access by a hosting provider, but can reconfigure the home directory of an FTP user.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ProFTPD | <=1.3.5 | |
ProFTPD | =1.3.6 | |
ProFTPD | =1.3.6-rc1 | |
ProFTPD | =1.3.6-rc2 | |
ProFTPD | =1.3.6-rc3 | |
ProFTPD | =1.3.6-rc4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-7418 has a medium severity rating as it allows local attackers to bypass security measures.
To fix CVE-2017-7418, upgrade to ProFTPD 1.3.5e or 1.3.6rc5 or later versions.
CVE-2017-7418 affects users of ProFTPD versions prior to 1.3.5e and those using 1.3.6 before 1.3.6rc5.
Attackers with local access can create symbolic links in user home directories allowing unauthorized access.
No, CVE-2017-7418 requires local access to exploit the vulnerability.