In WS_FTP Server versions before 8.8.8 (2022.0.8), an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in the Web Transfer Module allows File Discovery, Probe System Files, User-Controlled Filename, Path Traversal.
An authenticated file download flaw has been identified where a user can craft an API call that allows them to download a file from an arbitrary folder on the drive where that user host's root folder is located (by default this is C:)
Metrics
Affected Vendors & Products
References
History
Wed, 04 Sep 2024 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:progress:ws_ftp_server:*:*:*:*:*:*:*:* |
Wed, 28 Aug 2024 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Progress
Progress ws Ftp Server |
|
CPEs | cpe:2.3:a:progress:ws_ftp_server:-:*:*:*:*:*:*:* | |
Vendors & Products |
Progress
Progress ws Ftp Server |
|
Metrics |
ssvc
|
Wed, 28 Aug 2024 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In WS_FTP Server versions before 8.8.8 (2022.0.8), an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in the Web Transfer Module allows File Discovery, Probe System Files, User-Controlled Filename, Path Traversal. An authenticated file download flaw has been identified where a user can craft an API call that allows them to download a file from an arbitrary folder on the drive where that user host's root folder is located (by default this is C:) | |
Title | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Progress WS_FTP Server | |
Weaknesses | CWE-22 CWE-73 |
|
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: ProgressSoftware
Published:
Updated: 2024-08-28T17:50:10.933Z
Reserved: 2024-08-13T14:28:44.247Z
Link: CVE-2024-7744

Updated: 2024-08-28T17:50:00.436Z

Status : Analyzed
Published: 2024-08-28T17:15:11.380
Modified: 2024-09-04T17:57:51.657
Link: CVE-2024-7744

No data.