Unrestricted File Upload in WS_FTP Server <8.7.6/8.8.4
CVE-2023-42659 Published on November 7, 2023
WS_FTP Server Arbitrary File Upload
In WS_FTP Server versions prior to 8.7.6 and 8.8.4, an unrestricted file upload flaw has been identified. An authenticated Ad Hoc Transfer user has the ability to craft an API call which allows them to upload a file to a specified location on the underlying operating system hosting the WS_FTP Server application.
Vulnerability Analysis
CVE-2023-42659 can be exploited with network access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a high impact on confidentiality, with no impact on integrity and availability.
Weakness Type
What is an Unrestricted File Upload Vulnerability?
The software allows the attacker to upload or transfer files of dangerous types that can be automatically processed within the product's environment.
CVE-2023-42659 has been classified to as an Unrestricted File Upload vulnerability or weakness.
Products Associated with CVE-2023-42659
stack.watch emails you whenever new vulnerabilities are published in Progress Ws Ftp Server or Ipswitch Ws Ftp Server. Just hit a watch button to start following.
Affected Versions
Progress Software Corporation WS_FTP Server:- Version 8.8.0 and below 8.8.4 is affected.
- Version 8.7.0 and below 8.7.6 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.