PhpWebFtp Cross Site Scripting Vulnerability

Risk: Low
Local: No
Remote: Yes

CVSS Base Score: 4.3/10
Impact Subscore: 2.9/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

Summary =============================================== phpWebFTP enables connections to FTP servers, even behind a firewall not allowing traffic. phpWebFTP bypasses the firewall by making a FTP connection from your webserver to the FTP server and transfering the files to your webclient over the http protocol =========================================== Issue: PhpWebftp is prone to multiple XSS vulnerability .An attacker may leverage this issue to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.the exploit is tested on PhpWebFtp v2.3. Proof of Concept XSS is possible via malicious arguments passed on the web browser using POST Method relative to the path of phpWebftp ie. server=1&port=<script>var%20sub_variable=11233;alert(sub_variable);</scr ipt>&goPassive=on&user=1&password=1&language=bulgarian Further XSS Details and Xploits :

Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2023,


Back to Top