Description
Biscom Secure File Transfer is vulnerable to cross-site scripting in the File Name field. An authenticated user with permissions to upload or send files can populate this field with a filename that contains standard HTML scripting tags. The resulting script will evaluated by any other authenticated user who views the attacker-supplied file name. All versions of SFT prior to 5.1.1028 are affected. The fix version is 5.1.1028.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2017-14352 | Biscom Secure File Transfer is vulnerable to cross-site scripting in the File Name field. An authenticated user with permissions to upload or send files can populate this field with a filename that contains standard HTML scripting tags. The resulting script will evaluated by any other authenticated user who views the attacker-supplied file name. All versions of SFT prior to 5.1.1028 are affected. The fix version is 5.1.1028. |
References
History
No history.
Status: PUBLISHED
Assigner: rapid7
Published:
Updated: 2024-08-05T14:55:35.883Z
Reserved: 2017-01-09T00:00:00.000Z
Link: CVE-2017-5247
No data.
Status : Modified
Published: 2017-07-18T18:29:00.263
Modified: 2026-05-13T00:24:29.033
Link: CVE-2017-5247
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD