An issue was discovered in Secudos Qiata FTA 1.70.19. The comment feature allows persistent XSS that is executed when reading transfer comments or the global notice board.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-024.txt | third party advisory exploit |
https://www.qiata.com | product vendor advisory |
https://www.syss.de/pentest-blog/syss-2020-024-und-syss-2020-025-zwei-schwachstellen-in-file-transfer-loesung-von-qiata | third party advisory |
https://github.com/patrickhener/CVE-2020-14294 | third party advisory |
http://seclists.org/fulldisclosure/2020/Sep/50 | mailing list exploit third party advisory |