FTP: Rhino Software Serv-U FTP Server rnto Command Directory Traversal
This signature detects attempts to exploit a known directory traversal vulnerability in the Rhino Software Serv-U FTP Server. It is due to an input validation error in server that does not properly sanitize the rnto command. A successful attack allows authenticated remote attackers to write arbitrary files to any location on the server. Also, the attacker can overwrite any file in the target server, which can cause a denial-of-service condition or allow them to run arbitrary commands on the target.
Extended Description
RhinoSoft Serv-U FTP server is prone to a directory-traversal vulnerability because the application fails to sufficiently sanitize user-supplied input. Exploiting this issue allows an attacker to write arbitrary files to locations outside of the application's current directory. This could help the attacker launch further attacks. Serv-U FTP server 7.2.0.1 is vulnerable; other versions may also be affected.
Affected Products
Rhino_software serv-u
References
BugTraq: 31563
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Rhino_software