A Progress Software WS_FTP Server is used to store, share and transfer information between systems, applications, groups and individuals.
Progress Software WS_FTP Server could allow a remote attacker to execute arbitrary commands on the system, caused by the unsafe deserialization of data by the Ad Hoc Transfer module.
By sending a specially crafted request, an attacker could exploit this vulnerability to execute arbitrary commands on the system.
POST /AHT/AhtApiService.asmx/AuthUser PAYLOAD - ::AHT_DEFAULT_UPLOAD_PARAMETER::AAEAAAD/////AQAAAAAAAAAMAgAAAElTeXN0ZW0sIFZlcnNpb249NC4wLjAuMCwgQ3VsdHVyZT1uZXV0cmFsLCBQdWJsaWNLZXlUb2tlbj1iNzdhNWM1NjE5MzRlMDg5BQEAAACEAVN5c3RlbS5Db2xsZWN0aW9ucy5HZW5lcmljLlNvcnRlZFNldGAxW1tTeXN0ZW0uU3RyaW5nLCBtc2NvcmxpYiwgVmVyc2lvbj00LjAuMC4wLCBDdWx0 [snipped]
By turning this into a traffic file and matching rule, we are able to detect attempts to execute arbitrary commands on the system.
Idappcom have created signature 8024263 along with a traffic file for this vulnerability.
If you are concerned that your business may be at risk of this vulnerability or others why not try out our Traffic IQ software which can scan your defences and report any issues. Learn more here: https://www.idappcom.co.uk/traffic-iq-professional