Wing FTP Server 3.5.0 Cross Site Scripting Vulnerability

2010.06.26
Credit: hack.werew01f
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79


CVSS Base Score: 4.3/10
Impact Subscore: 2.9/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

Wing FTP Server - Cross Site Scripting Vulnerability From: werew01f <hack.werew01f () gmail com> Date: Wed, 2 Jun 2010 17:35:33 +0800 Security Advisory: Wing FTP Server - Cross Site Scripting Vulnerability ======================================================== Discovered Date: May 31, 2010 System affected: Wing FTP Server for Windows, Version 3.5.0 and prior version Vulnerability Description: ================== Wing FTP server is a multi-protocol file server, which support such as HTTP and FTP. It comes with a Web-based "Administrator" Console. The XSS vulnerability is found in the "Administrator" Web interface. In the "Administrator" web interface, script can be injected from the POST command. This can be exploited by injecting arbitrary HTML and malicious script code, which will execute in a user's browser session. The Vulnerable URL: http://x.x.x.x:5466/admin_loginok.html (Default port is 5466). Researcher Info: ============ Discovered by: w01f Website: http://labs-werew01f.blogspot.com E-mail: hack [dot] werew01f [at] gmail [dot] com

References:

http://xforce.iss.net/xforce/xfdb/59094
http://www.securityfocus.com/bid/40510
http://www.osvdb.org/65444
http://seclists.org/fulldisclosure/2010/Jun/49
http://seclists.org/fulldisclosure/2010/Jun/128
http://labs-werew01f.sectester.net/2010/06/wing-ftp-server-cross-site-scripting.html
http://archives.neohapsis.com/archives/bugtraq/2010-06/0031.html


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top