In uftpd before 2.11, it is possible for an unauthenticated user to perform a directory traversal attack using multiple different FTP commands and read and write to arbitrary locations on the filesystem due to the lack of a well-written chroot jail in compose_abspath(). This has been fixed in version 2.11
[
{
"id": "CVE-2020-5221-6bb940c7",
"deprecated": false,
"signature_version": "v1",
"digest": {
"line_hashes": [
"108229206972147259569248804372767412868",
"276360762841382069748424337075868013451",
"242312807191981524080516238265272007214",
"250357959569044888915036652998736230067"
],
"threshold": 0.9
},
"target": {
"file": "src/common.c"
},
"signature_type": "Line",
"source": "https://github.com/troglobit/uftpd/commit/455b47d3756aed162d2d0ef7f40b549f3b5b30fe"
}
]