cvelist/2008/2xxx/CVE-2008-2399.json
2019-03-18 02:52:50 +00:00

92 lines
3.2 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-2399",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Directory traversal vulnerability in the FireFTP add-on before 0.98.20080518 for Firefox allows remote FTP servers to create or overwrite arbitrary files via ..\\ (dot dot backslash) sequences in responses to (1) MLSD and (2) LIST commands, a related issue to CVE-2002-1345. NOTE: this can be leveraged for code execution by writing to a Startup folder."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2008-1596",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1596/references"
},
{
"name": "fireftp-mlsd-list-directory-traversal(42516)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42516"
},
{
"name": "http://www.mozdev.org/source/browse/fireftp/src/content/js/connection/controlSocket.js.in.diff?r1=1.58;r2=1.59;f=h",
"refsource": "CONFIRM",
"url": "http://www.mozdev.org/source/browse/fireftp/src/content/js/connection/controlSocket.js.in.diff?r1=1.58;r2=1.59;f=h"
},
{
"name": "29289",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/29289"
},
{
"name": "30284",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30284"
},
{
"name": "http://vuln.sg/fireftp0971-en.html",
"refsource": "MISC",
"url": "http://vuln.sg/fireftp0971-en.html"
},
{
"name": "VU#906907",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/906907"
}
]
}
}