CVE-2017-5246

Biscom Secure File Transfer is vulnerable to AngularJS expression injection in the Display Name field. An authenticated user can populate this field with a valid AngularJS expression, wrapped in double curly-braces ({{ }}). This expression will be evaluated by any other authenticated user who views the attacker's display name. Affected versions are 5.0.0000 through 5.1.1026. The Issue is fixed in 5.1.1028.
Configurations

Configuration 1 (hide)

cpe:2.3:a:biscom:secure_file_transfer:-:*:*:*:*:*:*:*

History

21 Nov 2024, 03:27

Type Values Removed Values Added
References () https://cve.biscom.com/bis-sft-cv-0004/ - () https://cve.biscom.com/bis-sft-cv-0004/ -
References () https://twitter.com/i_bo0om/status/885050741567750145 - Third Party Advisory () https://twitter.com/i_bo0om/status/885050741567750145 - Third Party Advisory

Information

Published : 2017-07-18 18:29

Updated : 2024-11-21 03:27


NVD link : CVE-2017-5246

Mitre link : CVE-2017-5246

CVE.ORG link : CVE-2017-5246


JSON object : View

Products Affected

biscom

  • secure_file_transfer
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')