Sophos Web Appliance < 4.3.2 FTP Redirect Page Reflected XSS

Medium Nessus Plugin ID 100872


The remote host is running a web application that is affected by a reflected cross-site scripting vulnerability.


According to its self-reported version number, the Sophos Web Appliance software running on the remote host is prior to 4.3.2. It is, therefore, affected by a reflected cross-site scripting (XSS) vulnerability in the FTP redirect page (ftp_redirect.php) due to improper validation of user-supplied input. An unauthenticated, remote attacker can exploit this, via a specially crafted request, to execute arbitrary script code in a user's browser session.


Upgrade to Sophos Web Appliance version 4.3.2 or later.

See Also

Plugin Details

Severity: Medium

ID: 100872

File Name: sophos_web_appliance_wsa_build_2694750.nasl

Version: $Revision: 1.2 $

Type: remote

Published: 2017/06/19

Modified: 2017/08/16

Dependencies: 65873

Risk Information

Risk Factor: Medium


Base Score: 4.3

Temporal Score: 3.6

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND


Base Score: 4.7

Temporal Score: 4.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:X

Vulnerability Information

CPE: cpe:/a:sophos:web_appliance

Required KB Items: installed_sw/sophos_web_protection

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2017/05/30

Vulnerability Publication Date: 2017/05/30

Reference Information

CVE: CVE-2017-9523

BID: 99016

OSVDB: 158484