SolarWinds Serv-U FTP 15.1.6.25 Cross Site Scripting

2019.02.02
Credit: Chris Moberly
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79


CVSS Base Score: 3.5/10
Impact Subscore: 2.9/10
Exploitability Subscore: 6.8/10
Exploit range: Remote
Attack complexity: Medium
Authentication: Single time
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

Issue: Reflected Cross-Site Scripting CVE: CVE-2018-19934 Security researcher: Chris Moberly @ The Missing Link Security Product name: Serv-U FTP Server Product version: Tested on 15.1.6.25 (current as of Dec 2018) Fixed in: Serv-U 15.1.6 hotfix 3 # Overview The Serv-U FTP Server is vulnerable to a reflected cross-site scripting attack at the following injection points: **Injection Point: URL Path** * /Admin/XML * /Admin/XML/Result.xml As a proof of concept, browsing to the URLs below while authenticated as a member of one of the administrative groups will produce a harmless JavaScript alert box. * /Admin/XML/Result.xml%22%3balert('XSS!')//xxx?Command=DismissWhatsNew * /Admin/XML%22%3balert('XSS!')//xxx/Result.xml?Command=DismissWhatsNew Additionally, another less-likely injection point was found in a POST parameter. This can be demonstrated in the UI by defining an SMTP server and sending a test alert. The affected URL is as follows: **Injection Point: HTTP POST Parameter** * /Admin/XML/SMTPResult.xml ('SMTPServer' parameter)


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2020, cxsecurity.com

 

Back to Top