### [CVE-2017-7418](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7418) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description ProFTPD before 1.3.5e and 1.3.6 before 1.3.6rc5 controls whether the home directory of a user could contain a symbolic link through the AllowChrootSymlinks configuration option, but checks only the last path component when enforcing AllowChrootSymlinks. Attackers with local access could bypass the AllowChrootSymlinks control by replacing a path component (other than the last one) with a symbolic link. The threat model includes an attacker who is not granted full filesystem access by a hosting provider, but can reconfigure the home directory of an FTP user. ### POC #### Reference No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/DButter/whitehat_public - https://github.com/Dokukin1/Metasploitable - https://github.com/Iknowmyname/Nmap-Scans-M2 - https://github.com/NikulinMS/13-01-hw - https://github.com/Zhivarev/13-01-hw - https://github.com/smabramov/Vulnerabilities-and-attacks-on-information-systems - https://github.com/vshaliii/Funbox2-rookie - https://github.com/zzzWTF/db-13-01