FTGate4 systemacl.fts param1 Variable XSS

2005-12-20T03:45:17
ID OSVDB:22107
Type osvdb
Reporter Tim Shelton(security-advisories@acs-inc.com)
Modified 2005-12-20T03:45:17

Description

Vulnerability Description

FTGate contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'param1' variable upon submission to the 'systemacl.fts' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution Description

Upgrade to version 4.4.004 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

FTGate contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'param1' variable upon submission to the 'systemacl.fts' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Manual Testing Notes

POST /config/systemacl.fts?href=%2Fconfig%2Fsystemacl.fts&config=1003&command=0&id=0&param1=System+Timers%2C%2Fschedules%2Findex.fts[STRING INJECTIONHERE]&redirect=&data1=32&address=

References:

Vendor URL: http://www.ftgate.com/ Security Tracker: 1015399 Related OSVDB ID: 22105 Related OSVDB ID: 22104 Related OSVDB ID: 22106 Mail List Post: http://archives.neohapsis.com/archives/fulldisclosure/2005-12/1015.html Keyword: ACSSEC-2005-11-25 - 0x3 FrSIRT Advisory: ADV-2005-3010 CVE-2005-4567 Bugtraq ID: 15972