The ASG/ProxySG FTP proxy WebFTP mode allows intercepting FTP connections where a user accesses an FTP server via a ftp:// URL in a web browser. A stored cross-site scripting (XSS) vulnerability in the WebFTP mode allows a remote attacker to inject malicious JavaScript code in ASG/ProxySG's web listing of a remote FTP server. Exploiting the vulnerability requires the attacker to be able to upload crafted files to the remote FTP server. Affected versions: ASG 6.6 and 6.7 prior to 6.7.4.2; ProxySG 6.5 prior to 6.5.10.15, 6.6, and 6.7 prior to 6.7.4.2.
References
Link | Resource |
---|---|
https://support.symantec.com/us/en/article.SYMSA1472.html | Vendor Advisory |
https://support.symantec.com/us/en/article.SYMSA1472.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:55
Type | Values Removed | Values Added |
---|---|---|
References | () https://support.symantec.com/us/en/article.SYMSA1472.html - Vendor Advisory |
Information
Published : 2019-08-30 09:15
Updated : 2024-11-21 03:55
NVD link : CVE-2018-18370
Mitre link : CVE-2018-18370
CVE.ORG link : CVE-2018-18370
JSON object : View
Products Affected
broadcom
- symantec_proxysg
- advanced_secure_gateway
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')