9 results (0.007 seconds)

CVSS: 6.1EPSS: 0%CPEs: 2EXPL: 1

The Web Client in Cerberus FTP Server Enterprise before 10.0.19 and 11.x before 11.0.4 allows XSS via an SVG document. El Cliente Web en Cerberus FTP Server Enterprise versiones anteriores a 10.0.19 y 11.x versiones anteriores a 11.0.4 permite un XSS por medio de un documento SVG • https://www.exploit-db.com/exploits/49981 https://www.cerberusftp.com/products/releasenotes https://www.cerberusftp.com/xss-vulnerability-when-previewing-svg-content • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 1

The zip API endpoint in Cerberus FTP Server 8 allows an authenticated attacker without zip permission to use the zip functionality via an unrestricted API endpoint. Improper permission verification occurs when calling the file/ajax_download_zip/zip_name endpoint. The result is that a user without permissions can zip and download files even if they do not have permission to view whether the file exists. El endpoint de la API zip en Cerberus FTP Server versión 8, permite a un atacante autenticado sin permiso zip usar la funcionalidad zip por medio de un endpoint API sin restricciones. La comprobación de permisos inapropiada ocurre cuando se llama al endpoint file/ajax_download_zip/zip_name. • https://support.cerberusftp.com/hc/en-us/community/topics/360000164199-Announcements https://www.doyler.net/security-not-included/cerberus-ftp-vulnerabilities • CWE-639: Authorization Bypass Through User-Controlled Key •

CVSS: 8.1EPSS: 0%CPEs: 2EXPL: 1

Cerberus FTP Server Enterprise Edition prior to versions 11.0.3 and 10.0.18 allows an authenticated attacker to create files, display hidden files, list directories, and list files without the permission to zip and download (or unzip and upload) files. There are multiple ways to bypass certain permissions by utilizing the zip and unzip features. As a result, users without permission can see files, folders, and hidden files, and can create directories without permission. Cerberus FTP Server Enterprise Edition versiones anteriores a 11.0.3 y 10.0.18, permite a un atacante autenticado crear archivos, mostrar archivos ocultos, enumerar directorios y listar archivos sin el permiso para comprimir y descargar (o descomprimir y cargar) archivos. Existen varias maneras de omitir determinados permisos utilizando las funcionalidades de descompresión y descompresión. • https://support.cerberusftp.com/hc/en-us/community/topics/360000164199-Announcements https://www.cerberusftp.com/zip-unzip-permission-bypass-vulnerability-fixed-in-cerberus-ftp-server-versions-11-0-3-and-10-0-18 https://www.doyler.net/security-not-included/cerberus-ftp-vulnerabilities • CWE-276: Incorrect Default Permissions •

CVSS: 6.1EPSS: 0%CPEs: 2EXPL: 0

Reflected XSS through an IMG element in Cerberus FTP Server prior to versions 11.0.1 and 10.0.17 allows a remote attacker to execute arbitrary JavaScript or HTML via a crafted public folder URL. This occurs because of the folder_up.png IMG element not properly sanitizing user-inserted directory paths. The path modification must be done on a publicly shared folder for a remote attacker to insert arbitrary JavaScript or HTML. The vulnerability impacts anyone who clicks the malicious link crafted by the attacker. Una vulnerabilidad de tipo XSS Reflejado por medio de un elemento IMG en Cerberus FTP Server versiones anteriores a la versión 11.0.1 y 10.0.17, permite a un atacante remoto ejecutar JavaScript o HTML arbitrario por medio de una URL de carpeta pública especialmente diseñada. • https://support.cerberusftp.com/hc/en-us/community/topics/360000164199-Announcements https://www.cerberusftp.com/xss-vulnerability-in-public-shares-fixed-in-cerberus-ftp-server-version-11-0-1-and-10-0-17 https://www.doyler.net/security-not-included/cerberus-ftp-vulnerabilities • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

In Cerberus FTP Server 8.0.10.1, a crafted HTTP request causes the Windows service to crash. The attack methodology involves a long Host header and an invalid Content-Length header. En Cerberus FTP Server 8.0.10.1, una petición HTTP manipulada provoca que el servicio de Windows se caiga. La metodología de ataque involucra una larga cabecera Host y una cabecera Content-Length no válida. Cerberus FTP Server version 8.0.10.1 suffers from a denial of service vulnerability. • https://www.exploit-db.com/exploits/41596 http://www.securityfocus.com/bid/96887 • CWE-20: Improper Input Validation •