CVE-2022-2560

9.1 CRITICAL

📋 TL;DR

CVE-2022-2560 is an unauthenticated path traversal vulnerability in EnterpriseDT CompleteFTP Server that allows remote attackers to delete arbitrary files with SYSTEM privileges. The vulnerability exists due to improper path validation in the HttpFile class. All installations of CompleteFTP Server version 22.1.0 are affected.

💻 Affected Systems

Products:
  • EnterpriseDT CompleteFTP Server
Versions: 22.1.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: CompleteFTP Server runs with SYSTEM privileges by default, amplifying the impact. No authentication required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via deletion of critical system files, leading to OS corruption, service disruption, or potential privilege escalation to full SYSTEM control.

🟠

Likely Case

Service disruption through deletion of configuration files, web content, or user data, potentially causing business interruption and data loss.

🟢

If Mitigated

Limited impact if proper network segmentation and file system permissions are in place, though service disruption remains possible.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

ZDI published technical details but no public exploit code. The vulnerability is straightforward to exploit due to lack of authentication requirements.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 22.1.1 or later

Vendor Advisory: https://enterprisedt.com/products/completeftp/doc/guide/html/history.html

Restart Required: Yes

Instructions:

1. Download CompleteFTP Server version 22.1.1 or later from EnterpriseDT website. 2. Run the installer to upgrade. 3. Restart the CompleteFTP service. 4. Verify the new version is running.

🔧 Temporary Workarounds

Network Access Restriction

windows

Restrict network access to CompleteFTP Server to trusted IP addresses only

Use Windows Firewall: netsh advfirewall firewall add rule name="Block CompleteFTP" dir=in action=block protocol=TCP localport=21,990,8021,10000-10100 remoteip=any

Service Account Privilege Reduction

windows

Run CompleteFTP service under a limited user account instead of SYSTEM

1. Create limited user account. 2. In services.msc, change CompleteFTP service logon to this account. 3. Grant minimal necessary file permissions.

🧯 If You Can't Patch

  • Immediately restrict network access to CompleteFTP Server using firewall rules to allow only trusted sources
  • Implement strict file system permissions and monitor for unauthorized file deletion attempts

🔍 How to Verify

Check if Vulnerable:

Check CompleteFTP Server version in administration interface or via 'sc query CompleteFTPServer' and verify if version is 22.1.0

Check Version:

sc query CompleteFTPServer | findstr "DISPLAY_NAME" or check in CompleteFTP Admin interface

Verify Fix Applied:

Verify CompleteFTP Server version is 22.1.1 or later and test that file deletion via HTTP requests with path traversal payloads is blocked

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests with path traversal patterns (../ sequences) to CompleteFTP endpoints
  • Unexpected file deletion events in Windows Security logs
  • CompleteFTP error logs showing file access violations

Network Indicators:

  • HTTP requests to CompleteFTP web interface containing path traversal sequences
  • Unusual file deletion patterns via FTP/HTTP protocols

SIEM Query:

source="CompleteFTP" AND (http_uri="*../*" OR event="FileDelete")

🔗 References

📤 Share & Export