Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-27665 PoC — Progress ipswitch WS_FTP Server 跨站脚本漏洞

Source
Associated Vulnerability
Title:Progress ipswitch WS_FTP Server 跨站脚本漏洞 (CVE-2022-27665)
Description:Progress ipswitch WS_FTP Server是一款FTP服务器软件。 Progress ipswitch WS_FTP Server 8.6.0版本存在安全漏洞,该漏洞源于对用户提供的输入的处理不当。攻击者利用该漏洞在客户端执行恶意代码和命令。
Description
Reflected XSS via AngularJS Sandbox Escape Expressions in IPSwitch WS_FTP Server 8.6.0
Readme
# CVE-2022-27665
A Reflected XSS via AngularJS Sandbox Escape Expressions vulnerability exists in Progress/IPSwitch WS_FTP Server 8.6.0 that can lead to execution of malicious code and commands on the client due to improper handling of user provided input. By inputting malicious payloads in the subdirectory searchbar or Add folder filename boxes, it is possible to execute client-side commands.

This vulnerability is also known as a Client-Side Template Injection, and is similar to Server-Side Template Injections. 


<p align="center">
  <img src="https://github.com/dievus/CVE-2022-27665/blob/main/images/malinput.png" />
</p>

<p align="center">
  <img src="https://github.com/dievus/CVE-2022-27665/blob/main/images/burpinspect.png" />
</p>

<p align="center">
  <img src="https://github.com/dievus/CVE-2022-27665/blob/main/images/maloutput.png" />
</p>

**Vulnerability Timeline**

|      Date      |      Action      |
| -------------- | ---------------- |
| 3/22/2022      | Vulnerability discovered |
| 3/22/2022      | Vulnerability disclosed to vendor |
| 3/22/2022      | CVE ID Requested via MITRE |
| 3/22/2022      | Vendor requested resubmission via HackerOne |
| 3/23/2022      | MITRE reserved CVE ID | 
| 3/23/2022      | HackerOne accepted submission | 
| 3/30/2022      | Vulnerability acknowledged by vendor and set to triaged by H1 |
| 4/03/2023      | Vulnerability disclosed and CVE made public | 

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27665

File Snapshot

[4.0K] /data/pocs/41a0bb33b7e782a2f701ef88e36cb7db1b12b7bd ├── [4.0K] images │   ├── [105K] burpinspect.png │   ├── [ 43K] malinput.png │   └── [ 45K] maloutput.png └── [1.5K] README.md 1 directory, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.