# # This script was written by Xue Yong Zhi # # # See the Nessus Scripts License for details # if(description) { script_id(11374); script_version ("$Revision$"); #NO bugtraq_id script_cve_id("CAN-2001-0283"); name["english"] = "SunFTP directory traversal"; script_name(english:name["english"]); desc["english"] = " Directory traversal vulnerability in SunFTP build 9 allows remote attackers to read arbitrary files via .. (dot dot) characters in various commands, including (1) GET, (2) MKDIR, (3) RMDIR, (4) RENAME, or (5) PUT. Solution : Switching to another FTP server, SunFTP is discontinued. Risk factor : High"; script_description(english:desc["english"]); script_summary(english:"Checks if the remote SunFTP has directory traversal vulnerability"); script_category(ACT_MIXED_ATTACK); script_family(english:"FTP"); script_copyright(english:"This script is Copyright (C) 2003 Xue Yong Zhi", francais:"Ce script est Copyright (C) 2003 Xue Yong Zhi"); script_dependencie("find_service.nes"); script_require_keys("ftp/login"); script_require_ports("Services/ftp", 21); exit(0); } # # The script code starts here : # include("ftp_func.inc"); port = get_kb_item("Services/ftp"); if(!port)port = 21; if(!get_port_state(port))exit(0); if(safe_checks()) { banner = get_ftp_banner(port: port); if(banner) { if("SunFTP b9">