• 公告ID (KylinSec-SA-2022-1694)

摘要:

ProFTPD before 1.3.5e and 1.3.6 before 1.3.6rc5 controls whether the home directory of a user could contain a symbolic link through the AllowChrootSymlinks configuration option, but checks only the last path component when enforcing AllowChrootSymlinks. Attackers with local access could bypass the AllowChrootSymlinks control by replacing a path component (other than the last one) with a symbolic link. The threat model includes an attacker who is not granted full filesystem access by a hosting provider, but can reconfigure the home directory of an FTP user.

安全等级: Low

公告ID: KylinSec-SA-2022-1694

发布日期: 2022年7月30日

关联CVE: CVE-2017-7418  

  • 详细介绍

1. 漏洞描述

   

ProFTPD before 1.3.5e and 1.3.6 before 1.3.6rc5 controls whether the home directory of a user could contain a symbolic link through the AllowChrootSymlinks configuration option, but checks only the last path component when enforcing AllowChrootSymlinks. Attackers with local access could bypass the AllowChrootSymlinks control by replacing a path component (other than the last one) with a symbolic link. The threat model includes an attacker who is not granted full filesystem access by a hosting provider, but can reconfigure the home directory of an FTP user.

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2017-7418 KY3.4-4A proftpd Unaffected
CVE-2017-7418 KY3.4-5 proftpd Unaffected
CVE-2017-7418 KY3.5.1 proftpd Unaffected

3. 影响组件

    无

4. 修复版本

    无

5. 修复方法

   无

6. 下载链接

    无
上一篇:KylinSec-SA-2022-1693 下一篇:KylinSec-SA-2022-1695