Sophos Web Appliance < 4.3.0 FTP Redirect Page Reflected XSS

medium Nessus Plugin ID 100845

Synopsis

The remote host is running a web application that is affected by a reflected cross-site scripting vulnerability.

Description

According to its self-reported version number, the Sophos Web Appliance software running on the remote host is prior to 4.3.0. It is, therefore, affected by a reflected cross-site scripting (XSS) vulnerability in the FTP redirect page (ftp_redirect.php) due to improper validation of user-supplied input. An unauthenticated, remote attacker can exploit this, via a specially crafted request, to execute arbitrary script code in a user's browser session.

Solution

Upgrade to Sophos Web Appliance version 4.3.0 or later.

See Also

http://swa.sophos.com/rn/swa/concepts/ReleaseNotes_4.3.0.html

https://www.tenable.com/security/research/tra-2017-02

Plugin Details

Severity: Medium

ID: 100845

File Name: sophos_web_appliance_wsa_build_2637721.nasl

Version: 1.5

Type: remote

Published: 6/16/2017

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS v3

Risk Factor: Medium

Base Score: 4.7

Temporal Score: 4.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:sophos:web_appliance

Required KB Items: installed_sw/sophos_web_protection

Patch Publication Date: 10/17/2016

Vulnerability Publication Date: 1/11/2017

Reference Information