{"api_version":"1","generated_at":"2026-05-07T13:28:34+00:00","cve":"CVE-2020-5196","urls":{"html":"https://cve.report/CVE-2020-5196","api":"https://cve.report/api/cve/CVE-2020-5196.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2020-5196","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2020-5196"},"summary":{"title":"CVE-2020-5196","description":"Cerberus FTP Server Enterprise Edition prior to versions 11.0.3 and 10.0.18 allows an authenticated attacker to create files, display hidden files, list directories, and list files without the permission to zip and download (or unzip and upload) files. There are multiple ways to bypass certain permissions by utilizing the zip and unzip features. As a result, users without permission can see files, folders, and hidden files, and can create directories without permission.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2020-01-14 14:15:00","updated_at":"2020-01-17 03:02:00"},"problem_types":["CWE-276"],"metrics":[],"references":[{"url":"https://support.cerberusftp.com/hc/en-us/community/topics/360000164199-Announcements","name":"https://support.cerberusftp.com/hc/en-us/community/topics/360000164199-Announcements","refsource":"MISC","tags":["Release Notes","Vendor Advisory"],"title":"Announcements – Cerberus Support","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://www.cerberusftp.com/zip-unzip-permission-bypass-vulnerability-fixed-in-cerberus-ftp-server-versions-11-0-3-and-10-0-18/","name":"https://www.cerberusftp.com/zip-unzip-permission-bypass-vulnerability-fixed-in-cerberus-ftp-server-versions-11-0-3-and-10-0-18/","refsource":"MISC","tags":["Vendor Advisory"],"title":"Zip/Unzip permission bypass vulnerability fixed in Cerberus FTP Server versions 11.0.3 and 10.0.18","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.doyler.net/security-not-included/cerberus-ftp-vulnerabilities","name":"https://www.doyler.net/security-not-included/cerberus-ftp-vulnerabilities","refsource":"MISC","tags":["Exploit","Third Party Advisory"],"title":"Cerberus FTP Vulnerabilities – CVE-2020-5194, CVE-2020-5195, CVE-2020-5196 | doyler.net","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2020-5196","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-5196","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2020","cve_id":"5196","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cerberusftp","cpe5":"ftp_server","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"enterprise","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"5196","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cerberusftp","cpe5":"ftp_server","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"enterprise","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2020-5196","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Cerberus FTP Server Enterprise Edition prior to versions 11.0.3 and 10.0.18 allows an authenticated attacker to create files, display hidden files, list directories, and list files without the permission to zip and download (or unzip and upload) files. There are multiple ways to bypass certain permissions by utilizing the zip and unzip features. As a result, users without permission can see files, folders, and hidden files, and can create directories without permission."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"https://support.cerberusftp.com/hc/en-us/community/topics/360000164199-Announcements","refsource":"MISC","name":"https://support.cerberusftp.com/hc/en-us/community/topics/360000164199-Announcements"},{"refsource":"MISC","name":"https://www.doyler.net/security-not-included/cerberus-ftp-vulnerabilities","url":"https://www.doyler.net/security-not-included/cerberus-ftp-vulnerabilities"},{"refsource":"MISC","name":"https://www.cerberusftp.com/zip-unzip-permission-bypass-vulnerability-fixed-in-cerberus-ftp-server-versions-11-0-3-and-10-0-18/","url":"https://www.cerberusftp.com/zip-unzip-permission-bypass-vulnerability-fixed-in-cerberus-ftp-server-versions-11-0-3-and-10-0-18/"}]}},"nvd":{"publishedDate":"2020-01-14 14:15:00","lastModifiedDate":"2020-01-17 03:02:00","problem_types":["CWE-276"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE","baseScore":8.1,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.2},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":5.5},"severity":"MEDIUM","exploitabilityScore":8,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:cerberusftp:ftp_server:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"10.0.0","versionEndExcluding":"10.0.18","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:cerberusftp:ftp_server:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"11.0.0","versionEndExcluding":"11.0.3","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2020","CveId":"5196","Ordinal":"165308","Title":"CVE-2020-5196","CVE":"CVE-2020-5196","Year":"2020"},"notes":[{"CveYear":"2020","CveId":"5196","Ordinal":"1","NoteData":"Cerberus FTP Server Enterprise Edition prior to versions 11.0.3 and 10.0.18 allows an authenticated attacker to create files, display hidden files, list directories, and list files without the permission to zip and download (or unzip and upload) files. There are multiple ways to bypass certain permissions by utilizing the zip and unzip features. As a result, users without permission can see files, folders, and hidden files, and can create directories without permission.","Type":"Description","Title":null},{"CveYear":"2020","CveId":"5196","Ordinal":"2","NoteData":"2020-01-14","Type":"Other","Title":"Published"},{"CveYear":"2020","CveId":"5196","Ordinal":"3","NoteData":"2020-01-14","Type":"Other","Title":"Modified"}]}}}