Reflected XSS through an IMG element in Cerberus FTP Server prior to versions 11.0.1 and 10.0.17 allows a remote attacker to execute arbitrary JavaScript or HTML via a crafted public folder URL. This occurs because of the folder_up.png IMG element not properly sanitizing user-inserted directory paths. The path modification must be done on a publicly shared folder for a remote attacker to insert arbitrary JavaScript or HTML. The vulnerability impacts anyone who clicks the malicious link crafted by the attacker.
References
Link | Resource |
---|---|
https://support.cerberusftp.com/hc/en-us/community/topics/360000164199-Announcements | Release Notes Vendor Advisory |
https://www.cerberusftp.com/xss-vulnerability-in-public-shares-fixed-in-cerberus-ftp-server-version-11-0-1-and-10-0-17/ | Vendor Advisory |
https://www.doyler.net/security-not-included/cerberus-ftp-vulnerabilities | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2020-01-13T17:29:36
Updated: 2020-01-13T17:29:47
Reserved: 2020-01-02T00:00:00
Link: CVE-2020-5195
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-01-13T18:15:14.610
Modified: 2020-01-22T16:05:31.283
Link: CVE-2020-5195
JSON object: View
Redhat Information
No data.
CWE