ftp-srv@0.0.0-development vulnerabilities

Modern, extensible FTP Server

  • latest version

    4.6.3

  • latest non vulnerable version

  • first published

    7 years ago

  • latest version published

    1 years ago

  • Direct Vulnerabilities

    Known vulnerabilities in the ftp-srv package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Directory Traversal

    ftp-srv is a Modern, extensible FTP Server

    Affected versions of this package are vulnerable to Directory Traversal. In affected versions of the module, there is a path traversal vulnerability. Clients of FTP servers utilizing ftp-srv hosted on Windows machines can escape the FTP user's defined root folder using the expected FTP commands, such as CWD and UPDR. When windows separators exist within the path (\), path.resolve leaves the upper pointers intact, allowing the user to move beyond the root folder defined for that user.

    How to fix Directory Traversal?

    Upgrade ftp-srv to version 4.4.0 or higher.

    <4.4.0
    • H
    Server-side Request Forgery (SSRF)

    ftp-srv is a Modern, extensible FTP Server

    Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF). It fails to prevent remote clients to access other resources in the network, for example when connecting to the server through telnet. This allows attackers to access any network resources available to the server, including private resources in the hosting environment.

    How to fix Server-side Request Forgery (SSRF)?

    Upgrade ftp-srv to version 4.3.4, 3.1.2, 2.19.6 or higher.

    >=4.0.0 <4.3.4>=3.1.0 <3.1.2<2.19.6