Sophos Web Appliance < 4.3.2 FTP Redirect Page Reflected XSS

Medium Nessus Plugin ID 100872


The remote host is running a web application that is affected by a reflected cross-site scripting vulnerability.


According to its self-reported version number, the Sophos Web Appliance software running on the remote host is prior to 4.3.2. It is, therefore, affected by a reflected cross-site scripting (XSS) vulnerability in the FTP redirect page (ftp_redirect.php) due to improper validation of user-supplied input. An unauthenticated, remote attacker can exploit this, via a specially crafted request, to execute arbitrary script code in a user's browser session.


Upgrade to Sophos Web Appliance version 4.3.2 or later.

See Also

Plugin Details

Severity: Medium

ID: 100872

File Name: sophos_web_appliance_wsa_build_2694750.nasl

Version: 1.4

Type: remote

Published: 2017/06/19

Updated: 2019/11/13

Dependencies: 65873

Risk Information

Risk Factor: Medium

CVSS Score Source: CVE-2017-9523

CVSS v2.0

Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Temporal Vector: CVSS2#E:H/RL:OF/RC:C

CVSS v3.0

Base Score: 6.1

Temporal Score: 5.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:sophos:web_appliance

Required KB Items: installed_sw/sophos_web_protection

Exploit Available: false

Exploit Ease: No exploit is required

Patch Publication Date: 2017/05/30

Vulnerability Publication Date: 2017/05/30

Reference Information

CVE: CVE-2017-9523

BID: 99016