Risk | Low |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2024-7744 CVE-2024-7745 |
CWE-ID | CWE-22 CWE-287 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
WS_FTP Server applications / File servers (FTP/HTTP) |
Vendor | Progress Software Corporation |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU96633
Risk: Low
CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-7744
CWE-ID:
CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences within the FileHandler module. A remote user can send a specially crafted HTTP request and read arbitrary files on the system.
MitigationInstall update from vendor's website.
Vulnerable software versionsWS_FTP: 8.8.0 - 8.8.7
CPE2.3https://community.progress.com/s/article/WS-FTP-Server-Service-Pack-August-2024
https://www.progress.com/ftp-server
https://www.zerodayinitiative.com/advisories/ZDI-24-1184/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96634
Risk: Low
CVSSv4.0: 6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-7745
CWE-ID:
CWE-287 - Improper Authentication
Exploit availability: No
DescriptionThe vulnerability allows a remote user to bypass authentication process.
The vulnerability exists due to missing critical step in multi-factor authentication of the Web Transfer Module. A remote administrator can skip the second-factor verification and log in with username and password only.
MitigationInstall updates from vendor's website.
Vulnerable software versionsWS_FTP: 8.8.0 - 8.8.7
CPE2.3https://community.progress.com/s/article/WS-FTP-Server-Service-Pack-August-2024
https://www.progress.com/ftp-server
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.