Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
FTGate Multiple Remote Input Validation Vulnerabilities - exploit.company
header-logo
Suggest Exploit
vendor:
FTGate
by:
7.5
CVSS
HIGH
Cross-Site Scripting, HTML Injection
79, 116
CWE
Product Name: FTGate
Affected Version From:
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:

FTGate Multiple Remote Input Validation Vulnerabilities

FTGate is prone to multiple remote input validation vulnerabilities, including a cross-site scripting issue and an HTML injection vulnerability. These vulnerabilities are due to a failure of the application to properly sanitize user-supplied input before using it in dynamic web content. The cross-site scripting issue allows a remote attacker to create a malicious link that includes hostile HTML and script code, which can be executed in the victim's web browser. This can lead to theft of cookie-based authentication credentials and other attacks. The HTML injection vulnerability allows an attacker to execute arbitrary script code in the browser of an unsuspecting user, potentially stealing authentication credentials and sensitive information.

Mitigation:

To mitigate these vulnerabilities, it is recommended to update FTGate to the latest version, which should include fixes for these input validation issues. Additionally, users should exercise caution when clicking on links from untrusted sources.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/10058/info

It has been reported that FTGate is prone to multiple remote input validation vulnerabilities; a cross-site scripting issue and an HTML injection vulnerability. These issues are due to a failure of the application to properly sanitize user supplied input before using it in dynamic web content.

The cross-site scripting issue could permit a remote attacker to create a malicious link to the vulnerable application that includes hostile HTML and script code. If this link were followed, the hostile code may be rendered in the web browser of the victim user. This would occur in the security context of the affected web site and may allow for theft of cookie-based authentication credentials or other attacks.

An attacker may exploit the HTML injection vulnerability to execute arbitrary script code in the browser of an unsuspecting user. It may be possible to steal the unsuspecting user's cookie-based authentication credentials, as well as other sensitive information. Other attacks may also be possible. 

http://www.example.com/inbox/index.fts?folder=TEST&index=1