ftp-srv@2.16.2 vulnerabilities

Modern, extensible FTP Server

Direct Vulnerabilities

Known vulnerabilities in the ftp-srv package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Directory Traversal

ftp-srv is a Modern, extensible FTP Server

Affected versions of this package are vulnerable to Directory Traversal. In affected versions of the module, there is a path traversal vulnerability. Clients of FTP servers utilizing ftp-srv hosted on Windows machines can escape the FTP user's defined root folder using the expected FTP commands, such as CWD and UPDR. When windows separators exist within the path (\), path.resolve leaves the upper pointers intact, allowing the user to move beyond the root folder defined for that user.

How to fix Directory Traversal?

Upgrade ftp-srv to version 4.4.0 or higher.

<4.4.0
  • H
Server-side Request Forgery (SSRF)

ftp-srv is a Modern, extensible FTP Server

Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF). The client can send an arbitrary IP with the PORT command, which can be used to cause the server to make a connection elsewhere.

How to fix Server-side Request Forgery (SSRF)?

Upgrade ftp-srv to version 4.3.4 or higher.

>=1.0.0 <4.3.4
  • H
Server-side Request Forgery (SSRF)

ftp-srv is a Modern, extensible FTP Server

Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF). It fails to prevent remote clients to access other resources in the network, for example when connecting to the server through telnet. This allows attackers to access any network resources available to the server, including private resources in the hosting environment.

How to fix Server-side Request Forgery (SSRF)?

Upgrade ftp-srv to version 4.3.4, 3.1.2, 2.19.6 or higher.

>=4.0.0 <4.3.4 >=3.1.0 <3.1.2 <2.19.6