-
CVSS Score
-The vulnerability explicitly involves improper path sanitization in the SIZE command handler. Attackers exploit this by injecting traversal sequences to access files outside the intended directory. While no source code is available, the CVE description and exploit POC directly implicate the SIZE command processing logic. FTP servers typically have dedicated handlers for each command (like SIZE), making this the most likely location for the path validation flaw. The high confidence stems from the clear link between the attack vector (SIZE + traversal sequences) and the function's responsibility to validate file paths.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| CoreFtp | nuget | <= 2.0 |