Reflected XSS through an IMG element in Cerberus FTP Server prior to versions 11.0.1 and 10.0.17 allows a remote attacker to execute arbitrary JavaScript or HTML via a crafted public folder URL. This occurs because of the folder_up.png IMG element not properly sanitizing user-inserted directory paths. The path modification must be done on a publicly shared folder for a remote attacker to insert arbitrary JavaScript or HTML. The vulnerability impacts anyone who clicks the malicious link crafted by the attacker.
References
Link | Resource |
---|---|
https://support.cerberusftp.com/hc/en-us/community/topics/360000164199-Announcements | Release Notes Vendor Advisory |
https://www.cerberusftp.com/xss-vulnerability-in-public-shares-fixed-in-cerberus-ftp-server-version-11-0-1-and-10-0-17/ | Vendor Advisory |
https://www.doyler.net/security-not-included/cerberus-ftp-vulnerabilities | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2020-01-13 10:15
Updated : 2020-01-22 08:05
NVD link : CVE-2020-5195
Mitre link : CVE-2020-5195
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
cerberusftp
- ftp_server