Multiple vulnerabilities in Progress Software WS_FTP



Risk Low
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2024-7744
CVE-2024-7745
CWE-ID CWE-22
CWE-287
Exploitation vector Network
Public exploit N/A
Vulnerable software
WS_FTP
Server applications / File servers (FTP/HTTP)

Vendor Progress Software Corporation

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Path traversal

EUVDB-ID: #VU96633

Risk: Low

CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-7744

CWE-ID: CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences within the FileHandler module. A remote user can send a specially crafted HTTP request and read arbitrary files on the system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

WS_FTP: 8.8.0 - 8.8.7

CPE2.3 External links

https://community.progress.com/s/article/WS-FTP-Server-Service-Pack-August-2024
https://www.progress.com/ftp-server
https://www.zerodayinitiative.com/advisories/ZDI-24-1184/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Improper Authentication

EUVDB-ID: #VU96634

Risk: Low

CVSSv4.0: 6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-7745

CWE-ID: CWE-287 - Improper Authentication

Exploit availability: No

Description

The vulnerability allows a remote user to bypass authentication process.

The vulnerability exists due to missing critical step in multi-factor authentication of the Web Transfer Module. A remote administrator can skip the second-factor verification and log in with username and password only.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

WS_FTP: 8.8.0 - 8.8.7

CPE2.3 External links

https://community.progress.com/s/article/WS-FTP-Server-Service-Pack-August-2024
https://www.progress.com/ftp-server


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###