CVE-2011-10010
BaseFortify
Publication date: 2025-08-13
Last updated on: 2025-08-14
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| quickshare | file_server | 1.2.1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-22 | The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2011-10010 is a critical path traversal vulnerability in QuickShare File Server 1.2.1's FTP service caused by improper sanitization of user-supplied file paths. Authenticated users can exploit this flaw by submitting crafted sequences (like "../") to access or write files outside the intended virtual directory. When the default "Writable" option is enabled during account creation, attackers can upload arbitrary files to privileged system locations such as WINDOWS/system32. This can lead to remote code execution by placing malicious executables or MOF files that trigger execution. [1, 3, 4, 5]
How can this vulnerability impact me? :
This vulnerability allows attackers with low privileges and FTP access to read sensitive system files outside the intended directory, compromising confidentiality. More critically, if the "Writable" option is enabled, attackers can upload malicious files to system directories, enabling remote code execution. This can lead to full system compromise, including unauthorized control over the affected Windows system running QuickShare File Server 1.2.1. [1, 2, 3, 4, 5]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
The vulnerability can be detected by checking the FTP banner for the string "quickshare ftpd" to confirm the presence of the vulnerable QuickShare File Server FTP service. Additionally, an authenticated user can attempt to exploit the directory traversal by issuing FTP commands such as "get" with crafted paths containing "../" sequences to access files outside the intended directory (e.g., "get ../../../../../../../../boot.ini"). Using FTP commands USER and PASS to authenticate, TYPE I to switch to binary mode, and PORT to set active mode are part of the detection and exploitation process. These steps can help confirm if the server improperly sanitizes file paths and is vulnerable to path traversal. [2, 3, 5, 4]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include upgrading QuickShare File Server to version 1.2.2 or later, where the directory traversal vulnerability has been fixed. If upgrading is not immediately possible, disable or restrict FTP access, especially for accounts with the "Writable" option enabled, to prevent arbitrary file uploads. Monitoring and blocking suspicious FTP commands containing directory traversal sequences ("../") can also help. Additionally, consider disabling the FTP service if not required, or restricting it to trusted networks until a patch is applied. [6, 4, 5]