CVE-2011-10010
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-13

Last updated on: 2025-08-14

Assigner: VulnCheck

Description
QuickShare File Server 1.2.1 contains a path traversal vulnerability in its FTP service due to improper sanitation of user-supplied file paths. Authenticated users can exploit this flaw by submitting crafted sequences to access or write files outside the intended virtual directory. When the "Writable" option is enabled (default during account creation), this allows attackers to upload arbitrary files to privileged locations such as system32, enabling remote code execution via MOF injection or executable placement.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-13
Last Modified
2025-08-14
Generated
2026-05-07
AI Q&A
2025-08-13
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
quickshare file_server 1.2.1
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-22 The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2011-10010 is a critical path traversal vulnerability in QuickShare File Server 1.2.1's FTP service caused by improper sanitization of user-supplied file paths. Authenticated users can exploit this flaw by submitting crafted sequences (like "../") to access or write files outside the intended virtual directory. When the default "Writable" option is enabled during account creation, attackers can upload arbitrary files to privileged system locations such as WINDOWS/system32. This can lead to remote code execution by placing malicious executables or MOF files that trigger execution. [1, 3, 4, 5]


How can this vulnerability impact me? :

This vulnerability allows attackers with low privileges and FTP access to read sensitive system files outside the intended directory, compromising confidentiality. More critically, if the "Writable" option is enabled, attackers can upload malicious files to system directories, enabling remote code execution. This can lead to full system compromise, including unauthorized control over the affected Windows system running QuickShare File Server 1.2.1. [1, 2, 3, 4, 5]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

The vulnerability can be detected by checking the FTP banner for the string "quickshare ftpd" to confirm the presence of the vulnerable QuickShare File Server FTP service. Additionally, an authenticated user can attempt to exploit the directory traversal by issuing FTP commands such as "get" with crafted paths containing "../" sequences to access files outside the intended directory (e.g., "get ../../../../../../../../boot.ini"). Using FTP commands USER and PASS to authenticate, TYPE I to switch to binary mode, and PORT to set active mode are part of the detection and exploitation process. These steps can help confirm if the server improperly sanitizes file paths and is vulnerable to path traversal. [2, 3, 5, 4]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include upgrading QuickShare File Server to version 1.2.2 or later, where the directory traversal vulnerability has been fixed. If upgrading is not immediately possible, disable or restrict FTP access, especially for accounts with the "Writable" option enabled, to prevent arbitrary file uploads. Monitoring and blocking suspicious FTP commands containing directory traversal sequences ("../") can also help. Additionally, consider disabling the FTP service if not required, or restricting it to trusted networks until a patch is applied. [6, 4, 5]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart