ID

VAR-200708-0443


CVE

CVE-2007-4555


TITLE

Ipswitch WS_FTP Vulnerable to cross-site scripting

Trust: 0.8

sources: JVNDB: JVNDB-2007-004335

DESCRIPTION

Cross-site scripting (XSS) vulnerability in Ipswitch WS_FTP allows remote attackers to inject arbitrary web script or HTML via arguments to a valid command, which is not properly handled when it is displayed by the view log option in the administration interface. NOTE: this can be leveraged to create a new admin account. WS_FTP is prone to a cross-site scripting vulnerability. ---------------------------------------------------------------------- BETA test the new Secunia Personal Software Inspector! The Secunia PSI detects installed software on your computer and categorises it as either Insecure, End-of-Life, or Up-To-Date. Effectively enabling you to focus your attention on software installations where more secure versions are available from the vendors. Download the free PSI BETA from the Secunia website: https://psi.secunia.com/ ---------------------------------------------------------------------- TITLE: Ipswitch WS_FTP Server Script Insertion Vulnerability SECUNIA ADVISORY ID: SA26529 VERIFY ADVISORY: http://secunia.com/advisories/26529/ CRITICAL: Moderately critical IMPACT: Cross Site Scripting WHERE: >From remote SOFTWARE: WS_FTP Server 6.x http://secunia.com/product/14782/ DESCRIPTION: John Harwold has discovered a vulnerability in Ipswitch WS_FTP Server, which can be exploited by malicious users to conduct script insertion attacks. Parameters passed to valid FTP commands are not properly sanitised before the command is logged. The vulnerability is confirmed in WS_FTP Server 6. Other versions may also be affected. SOLUTION: Restrict access to the WS_FTP server to trusted users only. PROVIDED AND/OR DISCOVERED BY: John Harwold, VDA Labs ORIGINAL ADVISORY: http://lists.grok.org.uk/pipermail/full-disclosure/2007-August/065441.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2007-4555 // JVNDB: JVNDB-2007-004335 // BID: 81587 // VULHUB: VHN-27917 // PACKETSTORM: 58826

AFFECTED PRODUCTS

vendor:ipswitchmodel:ws ftpscope: - version: -

Trust: 1.4

vendor:ipswitchmodel:ws ftpscope:eqversion:*

Trust: 1.0

vendor:ipswitchmodel:ws ftpscope:eqversion:0

Trust: 0.3

sources: BID: 81587 // JVNDB: JVNDB-2007-004335 // CNNVD: CNNVD-200708-422 // NVD: CVE-2007-4555

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-4555
value: MEDIUM

Trust: 1.0

NVD: CVE-2007-4555
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200708-422
value: MEDIUM

Trust: 0.6

VULHUB: VHN-27917
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2007-4555
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-27917
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-27917 // JVNDB: JVNDB-2007-004335 // CNNVD: CNNVD-200708-422 // NVD: CVE-2007-4555

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.9

sources: VULHUB: VHN-27917 // JVNDB: JVNDB-2007-004335 // NVD: CVE-2007-4555

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200708-422

TYPE

XSS

Trust: 0.6

sources: CNNVD: CNNVD-200708-422

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-004335

PATCH

title:Fixed in 6.1url:http://docs.ipswitch.com/WS_FTP_Server611/ReleaseNotes/index.htm?k_id=ipswitch_ftp_documents_worldwide_ws_ftpserverv61releasenotes#link13

Trust: 0.8

sources: JVNDB: JVNDB-2007-004335

EXTERNAL IDS

db:NVDid:CVE-2007-4555

Trust: 2.8

db:SREASONid:3068

Trust: 2.0

db:SECUNIAid:26529

Trust: 1.8

db:OSVDBid:37961

Trust: 1.7

db:XFid:36237

Trust: 0.9

db:JVNDBid:JVNDB-2007-004335

Trust: 0.8

db:FULLDISCid:20070823 IPSWITCH FTP XSS LEADS TO FTP SERVER COMPROMISE

Trust: 0.6

db:CNNVDid:CNNVD-200708-422

Trust: 0.6

db:BIDid:81587

Trust: 0.4

db:VULHUBid:VHN-27917

Trust: 0.1

db:PACKETSTORMid:58826

Trust: 0.1

sources: VULHUB: VHN-27917 // BID: 81587 // JVNDB: JVNDB-2007-004335 // PACKETSTORM: 58826 // CNNVD: CNNVD-200708-422 // NVD: CVE-2007-4555

REFERENCES

url:http://securityreason.com/securityalert/3068

Trust: 2.0

url:http://lists.grok.org.uk/pipermail/full-disclosure/2007-august/065441.html

Trust: 1.8

url:http://osvdb.org/37961

Trust: 1.7

url:http://secunia.com/advisories/26529

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/36237

Trust: 1.1

url:http://xforce.iss.net/xforce/xfdb/36237

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-4555

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-4555

Trust: 0.8

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/26529/

Trust: 0.1

url:http://secunia.com/product/14782/

Trust: 0.1

url:https://psi.secunia.com/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-27917 // BID: 81587 // JVNDB: JVNDB-2007-004335 // PACKETSTORM: 58826 // CNNVD: CNNVD-200708-422 // NVD: CVE-2007-4555

CREDITS

Unknown

Trust: 0.3

sources: BID: 81587

SOURCES

db:VULHUBid:VHN-27917
db:BIDid:81587
db:JVNDBid:JVNDB-2007-004335
db:PACKETSTORMid:58826
db:CNNVDid:CNNVD-200708-422
db:NVDid:CVE-2007-4555

LAST UPDATE DATE

2025-04-10T23:19:59.667000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-27917date:2017-07-29T00:00:00
db:BIDid:81587date:2007-08-27T00:00:00
db:JVNDBid:JVNDB-2007-004335date:2012-09-25T00:00:00
db:CNNVDid:CNNVD-200708-422date:2007-10-29T00:00:00
db:NVDid:CVE-2007-4555date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-27917date:2007-08-28T00:00:00
db:BIDid:81587date:2007-08-27T00:00:00
db:JVNDBid:JVNDB-2007-004335date:2012-09-25T00:00:00
db:PACKETSTORMid:58826date:2007-08-24T20:57:16
db:CNNVDid:CNNVD-200708-422date:2007-08-27T00:00:00
db:NVDid:CVE-2007-4555date:2007-08-28T00:17:00