Site icon TheCyberThrone

Progress issues Patches for Critical WS_FTP Flaws

Advertisements

Progress Software, has issued a patch for a maximum severity vulnerability in its WS_FTP Server software and advises users to deploy the patch quickly.

During this week, Progress have disclosed multiple vulnerabilities impacting the software’s manager interface and Ad hoc Transfer Module.

Out of all the security flaws patched, two of them stand out in special, as they were rated as critical: CVE-2023-40044 and CVE-2023-42657.

Advertisements

CVE-2023-40044 has a CVSS score of 10, and if exploited it allows unauthenticated attackers to execute remote commands after successful exploitation of a .NET deserialization vulnerability in the Ad Hoc Transfer module.

CVE-2023-42657, is a directory traversal vulnerability that enables attackers to perform file operations outside the authorized WS_FTP folder path.

Attackers can take advantage of both vulnerabilities in low-complexity assaults that don’t requires users interaction.

The following are the remaining issues that affect WS_FTP Server versions prior to 8.8.2:

Advertisements

Progress strongly recommends its WS_FTP users to patch them. They’re also recommend upgrading to the most recent version which is 8.8.2

Progress also shared information on how to disable or remove the vulnerable WS_FTP Server Ad Hoc Transfer Module if it’s not being used.

Exit mobile version