CVE-2023-42657

9.9 CRITICAL

📋 TL;DR

A directory traversal vulnerability in WS_FTP Server allows attackers to perform file operations (delete, rename, create, remove) outside their authorized folder path, potentially affecting the underlying operating system. This affects WS_FTP Server versions prior to 8.7.4 and 8.8.2. Organizations using vulnerable versions are at risk of data loss, system compromise, or service disruption.

💻 Affected Systems

Products:
  • WS_FTP Server
Versions: All versions prior to 8.7.4 and 8.8.2
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All configurations using vulnerable versions are affected. The vulnerability exists in the core file handling logic.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via deletion of critical OS files, installation of malware, or ransomware deployment across the server.

🟠

Likely Case

Data loss or corruption through unauthorized file deletion/modification, potential privilege escalation, and service disruption.

🟢

If Mitigated

Limited to authorized user's directory if proper access controls and monitoring are in place, though traversal attempts may still occur.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated access to WS_FTP Server. Directory traversal techniques are well-documented and easy to implement.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.7.4 or 8.8.2

Vendor Advisory: https://community.progress.com/s/article/WS-FTP-Server-Critical-Vulnerability-September-2023

Restart Required: Yes

Instructions:

1. Download WS_FTP Server version 8.7.4 or 8.8.2 from Progress Software. 2. Backup current configuration and data. 3. Run the installer to upgrade. 4. Restart the WS_FTP Server service. 5. Verify functionality post-upgrade.

🔧 Temporary Workarounds

Restrict User Permissions

all

Limit WS_FTP user accounts to minimal necessary permissions and implement strict access controls.

Network Segmentation

all

Isolate WS_FTP Server from critical systems and implement firewall rules to restrict access.

🧯 If You Can't Patch

  • Implement strict file system permissions and monitor for unauthorized file operations.
  • Disable or restrict WS_FTP Server access to only essential users and networks.

🔍 How to Verify

Check if Vulnerable:

Check WS_FTP Server version in administration console or via installed programs list.

Check Version:

On Windows: Check Programs and Features. On Linux: Check package manager or installation directory.

Verify Fix Applied:

Confirm version is 8.7.4 or higher (for 8.7.x branch) or 8.8.2 or higher (for 8.8.x branch).

📡 Detection & Monitoring

Log Indicators:

  • Unusual file operations outside user directories
  • Failed directory traversal attempts in logs
  • Multiple delete/rename operations from single session

Network Indicators:

  • FTP commands with '../' patterns
  • Unusual file transfer patterns

SIEM Query:

source="ws_ftp_logs" AND (event="delete" OR event="rename" OR event="mkdir" OR event="rmdir") AND path="*../*"

🔗 References

📤 Share & Export