Skip to content

Reflected XSS via AngularJS Sandbox Escape Expressions in IPSwitch WS_FTP Server 8.6.0

Notifications You must be signed in to change notification settings

dievus/CVE-2022-27665

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

25 Commits
 
 
 
 

Repository files navigation

CVE-2022-27665

A Reflected XSS via AngularJS Sandbox Escape Expressions vulnerability exists in Progress/IPSwitch WS_FTP Server 8.6.0 that can lead to execution of malicious code and commands on the client due to improper handling of user provided input. By inputting malicious payloads in the subdirectory searchbar or Add folder filename boxes, it is possible to execute client-side commands.

This vulnerability is also known as a Client-Side Template Injection, and is similar to Server-Side Template Injections.

Vulnerability Timeline

Date Action
3/22/2022 Vulnerability discovered
3/22/2022 Vulnerability disclosed to vendor
3/22/2022 CVE ID Requested via MITRE
3/22/2022 Vendor requested resubmission via HackerOne
3/23/2022 MITRE reserved CVE ID
3/23/2022 HackerOne accepted submission
3/30/2022 Vulnerability acknowledged by vendor and set to triaged by H1
4/03/2023 Vulnerability disclosed and CVE made public

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27665

About

Reflected XSS via AngularJS Sandbox Escape Expressions in IPSwitch WS_FTP Server 8.6.0

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published