In uftpd before 2.11, it is possible for an unauthenticated user to perform a directory traversal attack using multiple different FTP commands and read and write to arbitrary locations on the filesystem due to the lack of a well-written chroot jail in compose_abspath(). This has been fixed in version 2.11
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-5221.json"
[
{
"digest": {
"line_hashes": [
"108229206972147259569248804372767412868",
"276360762841382069748424337075868013451",
"242312807191981524080516238265272007214",
"250357959569044888915036652998736230067"
],
"threshold": 0.9
},
"id": "CVE-2020-5221-6bb940c7",
"signature_type": "Line",
"source": "https://github.com/troglobit/uftpd/commit/455b47d3756aed162d2d0ef7f40b549f3b5b30fe",
"target": {
"file": "src/common.c"
},
"deprecated": false,
"signature_version": "v1"
}
]