CVE-2022-36967
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
In Progress WS_FTP Server prior to version 8.7.3, multiple reflected cross-site scripting (XSS) vulnerabilities exist in the administrative web interface. It is possible for a remote attacker to inject arbitrary JavaScript into a WS_FTP administrator's web session. This would allow the attacker to execute code within the context of the victim's browser.
En el servidor WS_FTP de Progress versiones anteriores a 8.7.3, se presentan múltiples vulnerabilidades de tipo cross-site scripting (XSS) reflejado en la interfaz web administrativa. Es posible que un atacante remoto inyecte JavaScript arbitrario en la sesión web de un administrador de WS_FTP. Esto permitiría al atacante ejecutar código dentro del contexto del navegador de la víctima
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-07-27 CVE Reserved
- 2022-08-02 CVE Published
- 2024-02-23 EPSS Updated
- 2024-08-03 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (2)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://community.progress.com/s/article/WS-FTP-Server-Critical-Security-Product-Alert-Bulletin-June-2022 | 2022-08-10 | |
https://www.progress.com/ws_ftp | 2022-08-10 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Progress Search vendor "Progress" | Ipswitch Ws Ftp Server Search vendor "Progress" for product "Ipswitch Ws Ftp Server" | < 8.7.3 Search vendor "Progress" for product "Ipswitch Ws Ftp Server" and version " < 8.7.3" | - |
Affected
|