Sophos Web Appliance < 4.3.2 FTP Redirect Page Reflected XSS

medium Nessus Plugin ID 100872


The remote host is running a web application that is affected by a reflected cross-site scripting vulnerability.


According to its self-reported version number, the Sophos Web Appliance software running on the remote host is prior to 4.3.2. It is, therefore, affected by a reflected cross-site scripting (XSS) vulnerability in the FTP redirect page (ftp_redirect.php) due to improper validation of user-supplied input. An unauthenticated, remote attacker can exploit this, via a specially crafted request, to execute arbitrary script code in a user's browser session.


Upgrade to Sophos Web Appliance version 4.3.2 or later.

See Also

Plugin Details

Severity: Medium

ID: 100872

File Name: sophos_web_appliance_wsa_build_2694750.nasl

Version: 1.4

Type: remote

Published: 6/19/2017

Updated: 11/13/2019

Supported Sensors: Nessus

Risk Information


Risk Factor: Low

Score: 3.0


Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS Score Source: CVE-2017-9523


Risk Factor: Medium

Base Score: 6.1

Temporal Score: 5.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:sophos:web_appliance

Required KB Items: installed_sw/sophos_web_protection

Exploit Ease: No exploit is required

Patch Publication Date: 5/30/2017

Vulnerability Publication Date: 5/30/2017

Reference Information

CVE: CVE-2017-9523

BID: 99016