Sophos Web Appliance < 4.3.0 FTP Redirect Page Reflected XSS

Medium Nessus Plugin ID 100845


The remote host is running a web application that is affected by a reflected cross-site scripting vulnerability.


According to its self-reported version number, the Sophos Web Appliance software running on the remote host is prior to 4.3.0. It is, therefore, affected by a reflected cross-site scripting (XSS) vulnerability in the FTP redirect page (ftp_redirect.php) due to improper validation of user-supplied input. An unauthenticated, remote attacker can exploit this, via a specially crafted request, to execute arbitrary script code in a user's browser session.


Upgrade to Sophos Web Appliance version 4.3.0 or later.

See Also

Plugin Details

Severity: Medium

ID: 100845

File Name: sophos_web_appliance_wsa_build_2637721.nasl

Version: $Revision: 1.2 $

Type: remote

Published: 2017/06/16

Modified: 2017/06/20

Dependencies: 65873

Risk Information

Risk Factor: Medium


Base Score: 4.3

Temporal Score: 3.6

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND


Base Score: 4.7

Temporal Score: 4.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:X

Vulnerability Information

CPE: cpe:/a:sophos:web_appliance

Required KB Items: installed_sw/sophos_web_protection

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2016/10/17

Vulnerability Publication Date: 2017/01/11

Reference Information

OSVDB: 149958

TRA: TRA-2017-02