header-logo
Suggest Exploit
vendor:
FirstClass
by:
Unknown
4.3
CVSS
MEDIUM
Cross-Site Scripting
79
CWE
Product Name: FirstClass
Affected Version From: 7.1
Affected Version To: 7.1
Patch Exists: NO
Related CWE:
CPE: a:centrinity:firstclass:7.1
Metasploit:
Other Scripts:
Platforms Tested:
Unknown

FirstClass HTTP Server Cross-Site Scripting Vulnerability

The FirstClass HTTP Server is prone to a cross-site scripting vulnerability that may allow a remote attacker to execute arbitrary HTML or script code in a user's browser. The vulnerability is caused by insufficient sanitization of user-supplied data via the 'TargetName' parameter of the 'Upload.shtml' script. An attacker can exploit this issue by injecting malicious code into the 'TargetName' parameter, which will be executed in the context of the user's browser when the vulnerable script is accessed.

Mitigation:

To mitigate this vulnerability, it is recommended to apply the vendor-supplied patches or updates. Additionally, it is advised to restrict access to the vulnerable script or disable it if not required. Regularly monitoring and sanitizing user input can also help prevent cross-site scripting attacks.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/9950/info

It has been reported that FirstClass HTTP Server may be prone to a cross-site scripting vulnerability that may allow a remote attacker to execute arbitrary HTML or script code in a user's browser. The issue presents itself due to insufficient sanitization of user-supplied data via the 'TargetName' parameter of 'Upload.shtml' script.

Since this vulnerability affects the web server there is a possibility of an attacker crossing domains if multiple domains are hosted on one web server. The vendor has reported that this vulnerability only affects the 'standard' template set. The 'webmail' and 'mobile' template sets do not contain the 'Upload.shtml' script.

Centrinity FirstClass versions 7.1 and prior may be vulnerable to this issue.

http://www.example.com/.Templates/Commands/Upload.shtml?TargetName=<script>alert('XSS')</script>