Multiple vulnerabilities in Progress WS_FTP file transfer software

?

Anyone remember MOVEIt? The same vendor, Progress Software, has reported seven vulnerabilities in its highly popular and veteran WS_FTP software, the most critical of which have gained CVSS ratings of 9.9 & 10 respectively.

?

·???????? CVE-2023-40044 (CVSS: 10) - a pre-authenticated attacker could leverage a .NET deserialization vulnerability, resulting in Remote Code Execution (RCE)

?

·???????? CVE-2023-42657 (CVSS 9.9) - a directory traversal vulnerability allowing an attacker to execute file commands both within the application folder structure and on the underlying Operating System

?

·???????? CVE-2023-40045 (CVSS 8.3) - a reflected cross-site scripting (XSS) vulnerability that could result in the execution of malicious JavaScript within the context of the victim’s browser.

?

·???????? CVE-2023-40046 (CVSS 8.2) - a SQL injection vulnerability giving an attacker the ability to execute SQL statements that alter or delete database elements.

?

·???????? CVE-2023-40048 (CVSS 6.8) - In WS_FTP Server version prior to 8.8.2, the WS_FTP Server Manager interface was missing cross-site request forgery (CSRF) protection on a POST transaction corresponding to a WS_FTP Server administrative function.

?

·???????? CVE-2022-27665 (CVSS 6.1) - Reflected XSS vulnerability leading to execution of malicious code and commands on the client.

?

·???????? CVE-2023-40049 (CVSS 5.3) – information disclosure vulnerability, allowing an unauthenticated attacker to enumerate files under the 'WebServiceHost' directory listing.

?

?

In the majority of these cases, the versions affected are those prior to 8.8.4 & 8.7.2. Progress have released detailed information, including patch availability and IOCs for detection, on their web site

?

e2e-assure have ingested these and other IOCs into our Threat Intelligence Platforms and are working with customers to ensure they remain protected. If this is relevant and a concern to you, please get in touch with us via email ([email protected]) or via our Social Media channels and one of our experts will be happy to assist you.

要查看或添加评论,请登录

Duncan W.的更多文章

  • MS SharePoint Server CRITICAL Vulnerabilities

    MS SharePoint Server CRITICAL Vulnerabilities

    Details are emerging of an exploit chain combining two vulnerabilities affecting the current, on-premise version (2019)…

    2 条评论

社区洞察

其他会员也浏览了