ALFTP FTP Client 4.1/5.0 - 'LIST' Directory Traversal

Author: Tan Chew Keong
type: remote
platform: linux
port: 
date_added: 2008-06-06  
date_updated: 2014-02-25  
verified: 1  
codes: CVE-2008-2702;OSVDB-46044  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 31887.txt  
source: https://www.securityfocus.com/bid/29585/info

ALFTP is prone to a directory-traversal vulnerability because the application fails to sufficiently sanitize user-supplied input. This issue occurs in the FTP client.

Exploiting this issue will allow an attacker to write arbitrary files to locations outside of the application's current directory. This could help the attacker launch further attacks.

ALFTP 4.1 beta 2 (English) and 5.0 (Korean) are vulnerable; other versions may also be affected.

Response to LIST (backslash):

\..\..\..\..\..\..\..\..\..\testfile.txt\r\n

Response to LIST (forward-slash):
/../../../../../../../../../testfile.txt\r\n