NA

CVE-2022-27665

Published: 03/04/2023 Updated: 01/02/2024
CVSS v3 Base Score: 6.1 | Impact Score: 2.7 | Exploitability Score: 2.8
VMScore: 0

Vulnerability Summary

Reflected XSS (via AngularJS sandbox escape expressions) exists in Progress Ipswitch WS_FTP Server 8.6.0. This can lead to execution of malicious code and commands on the client due to improper handling of user-provided input. By inputting malicious payloads in the subdirectory searchbar or Add folder filename boxes, it is possible to execute client-side commands. For example, there is Client-Side Template Injection via subFolderPath to the ThinClient/WtmApiService.asmx/GetFileSubTree URI.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

progress ws ftp server 8.6.0

Vendor Advisories

Check Point Reference: CPAI-2022-2023 Date Published: 28 Feb 2024 Severity: Medium ...

Github Repositories

Reflected XSS via AngularJS Sandbox Escape Expressions in IPSwitch WS_FTP Server 8.6.0

CVE-2022-27665 A Reflected XSS via AngularJS Sandbox Escape Expressions vulnerability exists in Progress/IPSwitch WS_FTP Server 860 that can lead to execution of malicious code and commands on the client due to improper handling of user provided input By inputting malicious payloads in the subdirectory searchbar or Add folder filename boxes, it is possible to execute client-