Lucene search

K
nvd[email protected]NVD:CVE-2022-27665
HistoryApr 03, 2023 - 2:15 p.m.

CVE-2022-27665

2023-04-0314:15:07
CWE-79
web.nvd.nist.gov
8
progress ipswitch
ws_ftp server
reflected xss
angularjs
sandbox escape
client-side code execution
user-provided input
template injection

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

AI Score

7

Confidence

High

EPSS

0.001

Percentile

41.9%

Reflected XSS (via AngularJS sandbox escape expressions) exists in Progress Ipswitch WS_FTP Server 8.6.0. This can lead to execution of malicious code and commands on the client due to improper handling of user-provided input. By inputting malicious payloads in the subdirectory searchbar or Add folder filename boxes, it is possible to execute client-side commands. For example, there is Client-Side Template Injection via subFolderPath to the ThinClient/WtmApiService.asmx/GetFileSubTree URI.

Affected configurations

Nvd
Node
progressws_ftp_serverMatch8.6.0
VendorProductVersionCPE
progressws_ftp_server8.6.0cpe:2.3:a:progress:ws_ftp_server:8.6.0:*:*:*:*:*:*:*

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

AI Score

7

Confidence

High

EPSS

0.001

Percentile

41.9%

Related for NVD:CVE-2022-27665