漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
N/A
Vulnerability Description
Biscom Secure File Transfer is vulnerable to AngularJS expression injection in the Display Name field. An authenticated user can populate this field with a valid AngularJS expression, wrapped in double curly-braces ({{ }}). This expression will be evaluated by any other authenticated user who views the attacker's display name. Affected versions are 5.0.0000 through 5.1.1026. The Issue is fixed in 5.1.1028.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
Biscom Secure File Transfer 注入漏洞
Vulnerability Description
Biscom Secure File Transfer(SFT)是美国Biscom公司的一套基于Web的文件传输解决方案。该方案具有文件共享、创建工作区和自动清理文件等功能。 Biscom SFT 5.0.0000至5.1.1026版本中的Display Name字段存在注入漏洞。攻击者可利用该漏洞注入AngularJS expression。
CVSS Information
N/A
Vulnerability Type
N/A