Reflected XSS (via AngularJS sandbox escape expressions)...
Moderate severity
Unreviewed
Published
Apr 3, 2023
to the GitHub Advisory Database
•
Updated Oct 7, 2023
Description
Published by the National Vulnerability Database
Apr 3, 2023
Published to the GitHub Advisory Database
Apr 3, 2023
Last updated
Oct 7, 2023
Reflected XSS (via AngularJS sandbox escape expressions) exists in Progress Ipswitch WS_FTP Server 8.6.0. This can lead to execution of malicious code and commands on the client due to improper handling of user-provided input. By inputting malicious payloads in the subdirectory searchbar or Add folder filename boxes, it is possible to execute client-side commands. For example, there is Client-Side Template Injection via subFolderPath to the ThinClient/WtmApiService.asmx/GetFileSubTree URI.
References