In WS_FTP Server versions before 8.8.8 (2022.0.8), an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in the Web Transfer Module allows File Discovery, Probe System Files, User-Controlled Filename, Path Traversal.   An authenticated file download flaw has been identified where a user can craft an API call that allows them to download a file from an arbitrary folder on the drive where that user host's root folder is located (by default this is C:)
History

Wed, 04 Sep 2024 18:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:progress:ws_ftp_server:*:*:*:*:*:*:*:*

Wed, 28 Aug 2024 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Progress
Progress ws Ftp Server
CPEs cpe:2.3:a:progress:ws_ftp_server:-:*:*:*:*:*:*:*
Vendors & Products Progress
Progress ws Ftp Server
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 28 Aug 2024 16:45:00 +0000

Type Values Removed Values Added
Description In WS_FTP Server versions before 8.8.8 (2022.0.8), an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in the Web Transfer Module allows File Discovery, Probe System Files, User-Controlled Filename, Path Traversal.   An authenticated file download flaw has been identified where a user can craft an API call that allows them to download a file from an arbitrary folder on the drive where that user host's root folder is located (by default this is C:)
Title Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Progress WS_FTP Server
Weaknesses CWE-22
CWE-73
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: ProgressSoftware

Published: 2024-08-28T16:30:14.787Z

Updated: 2024-08-28T17:50:10.933Z

Reserved: 2024-08-13T14:28:44.247Z

Link: CVE-2024-7744

cve-icon Vulnrichment

Updated: 2024-08-28T17:50:00.436Z

cve-icon NVD

Status : Analyzed

Published: 2024-08-28T17:15:11.380

Modified: 2024-09-04T17:57:51.657

Link: CVE-2024-7744

cve-icon Redhat

No data.