This vulnerability occurs when an application saves sensitive files, such as configuration or user data, within the directory served by an FTP server without proper access restrictions. This misconfiguration can allow unauthorized users to download these files directly.
FTP servers are designed to share files, so any data placed within their root directory becomes potentially accessible to anyone who can connect. If sensitive files like `.env`, backup archives, or database dumps are stored there, attackers can easily retrieve them by simply browsing or using automated tools, leading to immediate data exposure. To prevent this, developers should never use the FTP root as a general storage location for sensitive data. Instead, confidential files must be kept outside the publicly served directory tree, with strict operating system permissions and FTP server configuration ensuring that only authorized processes can access them. Regular audits of the FTP directory contents are essential to catch accidental misplacements.
Impact: Read Application Data