First published: Sat Jan 08 2022(Updated: )
CoreFTP Server before 727 allows directory traversal (for file creation) by an authenticated attacker via ../ in an HTTP PUT request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tsolucio Corebos | <=1.2 | |
Tsolucio Corebos | =2.0-build_639 | |
Tsolucio Corebos | =2.0-build_640 | |
Tsolucio Corebos | =2.0-build_641 | |
Tsolucio Corebos | =2.0-build_642 | |
Tsolucio Corebos | =2.0-build_645 | |
Tsolucio Corebos | =2.0-build_647 | |
Tsolucio Corebos | =2.0-build_649 | |
Tsolucio Corebos | =2.0-build_651 | |
Tsolucio Corebos | =2.0-build_653 | |
Tsolucio Corebos | =2.0-build_655 | |
Tsolucio Corebos | =2.0-build_656 | |
Tsolucio Corebos | =2.0-build_657 | |
Tsolucio Corebos | =2.0-build_658 | |
Tsolucio Corebos | =2.0-build_659 | |
Tsolucio Corebos | =2.0-build_665 | |
Tsolucio Corebos | =2.0-build_667 | |
Tsolucio Corebos | =2.0-build_668 | |
Tsolucio Corebos | =2.0-build_671 | |
Tsolucio Corebos | =2.0-build_673 | |
Tsolucio Corebos | =2.0-build_674 | |
Tsolucio Corebos | =2.0-build_676 | |
Tsolucio Corebos | =2.0-build_677 | |
Tsolucio Corebos | =2.0-build_679 | |
Tsolucio Corebos | =2.0-build_682 | |
Tsolucio Corebos | =2.0-build_687 | |
Tsolucio Corebos | =2.0-build_689 | |
Tsolucio Corebos | =2.0-build_691 | |
Tsolucio Corebos | =2.0-build_694 | |
Tsolucio Corebos | =2.0-build_695 | |
Tsolucio Corebos | =2.0-build_697 | |
Tsolucio Corebos | =2.0-build_699 | |
Tsolucio Corebos | =2.0-build_702 | |
Tsolucio Corebos | =2.0-build_704 | |
Tsolucio Corebos | =2.0-build_705 | |
Tsolucio Corebos | =2.0-build_711 | |
Tsolucio Corebos | =2.0-build_713 | |
Tsolucio Corebos | =2.0-build_715 | |
Tsolucio Corebos | =2.0-build_719 | |
Tsolucio Corebos | =2.0-build_725 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-22836 is a vulnerability in CoreFTP Server that allows directory traversal (for file creation) by an authenticated attacker via ../ in an HTTP PUT request.
CVE-2022-22836 has a severity score of 6.5, which is considered medium.
The affected software versions include CoreFTP Server 1.2 and CoreFTP Server 2.0-build_639 to 2.0-build_725.
To fix CVE-2022-22836, it is recommended to update CoreFTP Server to a version that is not affected by the vulnerability.
More information about CVE-2022-22836 can be found at the following references: [http://www.coreftp.com/forums/viewtopic.php?f=15&t=4022509](http://www.coreftp.com/forums/viewtopic.php?f=15&t=4022509) and [https://yoursecuritybores.me/coreftp-vulnerabilities/](https://yoursecuritybores.me/coreftp-vulnerabilities/)