CVE-2022-22836
10.01.2022, 14:12
CoreFTP Server before 727 allows directory traversal (for file creation) by an authenticated attacker via ../ in an HTTP PUT request.
Vendor | Product | Version |
---|---|---|
coreftp | core_ftp | 𝑥 ≤ 1.2 |
coreftp | core_ftp | 2.0:build_639 |
coreftp | core_ftp | 2.0:build_640 |
coreftp | core_ftp | 2.0:build_641 |
coreftp | core_ftp | 2.0:build_642 |
coreftp | core_ftp | 2.0:build_645 |
coreftp | core_ftp | 2.0:build_647 |
coreftp | core_ftp | 2.0:build_649 |
coreftp | core_ftp | 2.0:build_651 |
coreftp | core_ftp | 2.0:build_653 |
coreftp | core_ftp | 2.0:build_655 |
coreftp | core_ftp | 2.0:build_656 |
coreftp | core_ftp | 2.0:build_657 |
coreftp | core_ftp | 2.0:build_658 |
coreftp | core_ftp | 2.0:build_659 |
coreftp | core_ftp | 2.0:build_665 |
coreftp | core_ftp | 2.0:build_667 |
coreftp | core_ftp | 2.0:build_668 |
coreftp | core_ftp | 2.0:build_671 |
coreftp | core_ftp | 2.0:build_673 |
coreftp | core_ftp | 2.0:build_674 |
coreftp | core_ftp | 2.0:build_676 |
coreftp | core_ftp | 2.0:build_677 |
coreftp | core_ftp | 2.0:build_679 |
coreftp | core_ftp | 2.0:build_682 |
coreftp | core_ftp | 2.0:build_687 |
coreftp | core_ftp | 2.0:build_689 |
coreftp | core_ftp | 2.0:build_691 |
coreftp | core_ftp | 2.0:build_694 |
coreftp | core_ftp | 2.0:build_695 |
coreftp | core_ftp | 2.0:build_697 |
coreftp | core_ftp | 2.0:build_699 |
coreftp | core_ftp | 2.0:build_702 |
coreftp | core_ftp | 2.0:build_704 |
coreftp | core_ftp | 2.0:build_705 |
coreftp | core_ftp | 2.0:build_711 |
coreftp | core_ftp | 2.0:build_713 |
coreftp | core_ftp | 2.0:build_715 |
coreftp | core_ftp | 2.0:build_719 |
coreftp | core_ftp | 2.0:build_725 |
𝑥
= Vulnerable software versions