Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-27665 PoC — Progress ipswitch WS_FTP Server 跨站脚本漏洞

Source
Associated Vulnerability
Title:Progress ipswitch WS_FTP Server 跨站脚本漏洞 (CVE-2022-27665)
Description:Reflected XSS (via AngularJS sandbox escape expressions) exists in Progress Ipswitch WS_FTP Server 8.6.0. This can lead to execution of malicious code and commands on the client due to improper handling of user-provided input. By inputting malicious payloads in the subdirectory searchbar or Add folder filename boxes, it is possible to execute client-side commands. For example, there is Client-Side Template Injection via subFolderPath to the ThinClient/WtmApiService.asmx/GetFileSubTree URI.
Description
Reflected XSS via AngularJS Sandbox Escape Expressions in IPSwitch WS_FTP Server 8.6.0
Readme
# CVE-2022-27665
A Reflected XSS via AngularJS Sandbox Escape Expressions vulnerability exists in Progress/IPSwitch WS_FTP Server 8.6.0 that can lead to execution of malicious code and commands on the client due to improper handling of user provided input. By inputting malicious payloads in the subdirectory searchbar or Add folder filename boxes, it is possible to execute client-side commands.

This vulnerability is also known as a Client-Side Template Injection, and is similar to Server-Side Template Injections. 


<p align="center">
  <img src="https://github.com/dievus/CVE-2022-27665/blob/main/images/malinput.png" />
</p>

<p align="center">
  <img src="https://github.com/dievus/CVE-2022-27665/blob/main/images/burpinspect.png" />
</p>

<p align="center">
  <img src="https://github.com/dievus/CVE-2022-27665/blob/main/images/maloutput.png" />
</p>

**Vulnerability Timeline**

|      Date      |      Action      |
| -------------- | ---------------- |
| 3/22/2022      | Vulnerability discovered |
| 3/22/2022      | Vulnerability disclosed to vendor |
| 3/22/2022      | CVE ID Requested via MITRE |
| 3/22/2022      | Vendor requested resubmission via HackerOne |
| 3/23/2022      | MITRE reserved CVE ID | 
| 3/23/2022      | HackerOne accepted submission | 
| 3/30/2022      | Vulnerability acknowledged by vendor and set to triaged by H1 |
| 4/03/2023      | Vulnerability disclosed and CVE made public | 

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27665

File Snapshot

[4.0K] /data/pocs/41a0bb33b7e782a2f701ef88e36cb7db1b12b7bd ├── [4.0K] images │   ├── [105K] burpinspect.png │   ├── [ 43K] malinput.png │   └── [ 45K] maloutput.png └── [1.5K] README.md 1 directory, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →