Vulnerabilities
Vulnerable Software
Alexander V. Lukyanov:  >> Lftp  Security Vulnerabilities
The get1 command, as used by lftpget, in LFTP before 4.0.6 does not properly validate a server-provided filename before determining the destination filename of a download, which allows remote servers to create or overwrite arbitrary files via a Content-Disposition header that suggests a crafted filename, and possibly execute arbitrary code as a consequence of writing to a dotfile in a home directory.
CVSS Score
7.5
EPSS Score
0.024
Published
2010-07-06
mirror --script in lftp before 3.5.9 does not properly quote shell metacharacters, which might allow remote user-assisted attackers to execute shell commands via a malicious script. NOTE: it is not clear whether this issue crosses security boundaries, since the script already supports commands such as "get" which could overwrite executable files.
CVSS Score
6.8
EPSS Score
0.023
Published
2007-04-27
Buffer overflows in (1) try_netscape_proxy and (2) try_squid_eplf for lftp 2.6.9 and earlier allow remote HTTP servers to execute arbitrary code via long directory names that are processed by the ls or rels commands.
CVSS Score
7.5
EPSS Score
0.154
Published
2004-01-05


Contact Us

Shodan ® - All rights reserved