Summary
This host is installed with Frams&qt Fast File EXchange and is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow attacker to conduct HTTP response splitting, conduct request forgery attacks and execute arbitrary HTML and script code in a user's browser session in the context of an affected site.
Impact Level: Application
Solution
Upgrade to Frams&qt Fast File EXchange version 20140526 or later.
For updates refer to http://fex.rus.uni-stuttgart.de
Insight
Multiple flaws are due to,
- An input passed via the 'akey' parameter to /rup is not properly sanitised before being returned to the user.
- An input passed via the 'addto' parameter to /fup is not properly sanitised before being returned to the user.
- An input passed via the 'disclaimer' and 'gm' parameters to /fuc is not properly sanitised before being returned to the user.
- Application allows users to perform certain actions via HTTP requests without performing proper validity checks to verify the requests.
Affected
Frams&qt Fast File EXchange before version 20140526
Detection
Send a crafted data via HTTP GET request and check whether it is possible to read a given string.
References
Severity
Classification
-
CVE CVE-2014-3875, CVE-2014-3876, CVE-2014-3877 -
CVSS Base Score: 4.3
AV:N/AC:M/Au:N/C:N/I:P/A:N
Related Vulnerabilities
- Apache mod_proxy_ftp Wildcard Characters XSS Vulnerability
- Apache Struts CookBook/Examples Multiple Cross-Site Scripting Vulnerabilities
- Adiscon LogAnalyzer 'highlight' Parameter Cross Site Scripting Vulnerability
- Admidio get_file.php Remote File Disclosure Vulnerability
- Aardvark Topsites <= 4.2.2 Remote File Inclusion Vulnerability