Reflected XSS Vulnerability in Progress Ipswitch WS_FTP Server
CVE-2022-27665

6.1MEDIUM

Key Information:

Vendor
Progress
Vendor
CVE Published:
3 April 2023

Badges

👾 Exploit Exists🟡 Public PoC

Summary

A reflected XSS vulnerability exists in Progress Ipswitch WS_FTP Server 8.6.0, arising from improper handling of user input. Attackers can exploit this flaw by injecting malicious payloads into the subdirectory search bar or Add folder filename fields. This exploitation can lead to the execution of unauthorized client-side commands, potentially impacting users' systems. The vulnerability also involves Client-Side Template Injection through the ThinClient/WtmApiService.asmx/GetFileSubTree URI, posing a significant risk to end-users and their data security. Detailed references can be found in the documentation and community articles.

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
6.1
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability Reserved

.