by Tan Chew Keong
Release Date: 2008-06-27
[en] [jp]
Summary
A vulnerability has been found within the FTP client in AceFTP. When exploited, this vulnerability allows an anonymous attacker to write files to arbitrary locations on a Windows user's system.
Tested Versions
Details
This advisory discloses a vulnerability within the FTP client in AceFTP. When exploited, this vulnerability allows an anonymous attacker to write files to arbitrary locations on a Windows user's system.
The FTP client does not properly sanitise filenames containing directory traversal sequences (forward-slash) that are received from an FTP server in response to the LIST command.
An example of such a response from a malicious FTP server is shown below.
Response to LIST (forward-slash):
-rw-r--r-- 1 ftp ftp 20 Mar 01 05:37 /../../../../../../../../../testfile.txt\r\n
By tricking a user to download a directory from a malicious FTP server that contains files with fowward-slash directory traversal sequences in their filenames, it is possible for the attacker to write files to arbitrary locations on a user's system with privileges of that user. An attacker can potentially leverage this issue to write files into a user's Windows Startup folder and execute arbitrary code when the user logs on.
POC / Test Code
Please download the POC here and follow the instructions below.
Kof 2002 Mugen Download Upd Android 💯 💫
“KOF 2002” — short for The King of Fighters 2002 — holds an almost mythic place among fighting-game fans. Praised for its deep roster, fast-paced mechanics, and perfectly tuned balance, KOF 2002 has become a fixture in arcades, tournaments, and emulated collections. Pairing that classic with M.U.G.E.N, the flexible 2D fighting-engine, has let creative communities extend, remix, and reimagine the game for decades. On Android, these remixes bring retro arcade thrills to pocket-sized screens, combining nostalgia with modern convenience — but they also raise practical and ethical questions. This editorial explores why KOF 2002 on M.U.G.E.N. for Android is compelling, the community dynamics behind it, and practical tips for enthusiasts.
Patch / Workaround
Avoid downloading files/directories from untrusted FTP servers.
Disclosure Timeline
2008-06-15 - Vulnerability Discovered.
2008-06-16 - Vulnerability Details Sent to Vendor via online support form (no reply).
2008-06-18 - Vulnerability Details Sent to Vendor again via online support form (no reply).
2008-06-25 - Vulnerability Details Sent to Vendor again via online support form (no reply).
2008-06-27 - Public Release.