CVE-2020-5195

Reflected XSS through an IMG element in Cerberus FTP Server prior to versions 11.0.1 and 10.0.17 allows a remote attacker to execute arbitrary JavaScript or HTML via a crafted public folder URL. This occurs because of the folder_up.png IMG element not properly sanitizing user-inserted directory paths. The path modification must be done on a publicly shared folder for a remote attacker to insert arbitrary JavaScript or HTML. The vulnerability impacts anyone who clicks the malicious link crafted by the attacker.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:cerberusftp:ftp_server:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:cerberusftp:ftp_server:*:*:*:*:enterprise:*:*:*

History

No history.

Information

Published : 2020-01-13 18:15

Updated : 2024-02-04 20:39


NVD link : CVE-2020-5195

Mitre link : CVE-2020-5195

CVE.ORG link : CVE-2020-5195


JSON object : View

Products Affected

cerberusftp

  • ftp_server
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')