Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2018-18370


The ASG/ProxySG FTP proxy WebFTP mode allows intercepting FTP connections where a user accesses an FTP server via a ftp:// URL in a web browser. A stored cross-site scripting (XSS) vulnerability in the WebFTP mode allows a remote attacker to inject malicious JavaScript code in ASG/ProxySG's web listing of a remote FTP server. Exploiting the vulnerability requires the attacker to be able to upload crafted files to the remote FTP server. Affected versions: ASG 6.6 and 6.7 prior to 6.7.4.2; ProxySG 6.5 prior to 6.5.10.15, 6.6, and 6.7 prior to 6.7.4.2.


Published

2019-08-30T09:15:16.567

Last Modified

2024-11-21T03:55:48.623

Status

Modified

Source

[email protected]

Severity

CVSSv3.0: 6.1 (MEDIUM)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:N/I:P/A:N

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: PARTIAL
  • Availability Impact: NONE
Exploitability Score

8.6

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-79

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application broadcom advanced_secure_gateway < 6.7.4.2 Yes
Application broadcom advanced_secure_gateway 6.6 Yes
Application broadcom symantec_proxysg < 6.5.10.15 Yes
Application broadcom symantec_proxysg < 6.7.4.2 Yes
Application broadcom symantec_proxysg 6.6 Yes

References