CVE-2023-40045

8.3 HIGH

📋 TL;DR

This reflected cross-site scripting (XSS) vulnerability in WS_FTP Server's Ad Hoc Transfer module allows attackers to execute malicious JavaScript in victims' browsers by tricking them into clicking specially crafted links. All WS_FTP Server users with vulnerable versions are affected, particularly those using the web interface for file transfers.

💻 Affected Systems

Products:
  • WS_FTP Server
Versions: All versions prior to 8.7.4 and 8.8.2
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the Ad Hoc Transfer module within WS_FTP Server's web interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, perform actions as authenticated users, redirect to malicious sites, or install malware through drive-by downloads.

🟠

Likely Case

Session hijacking leading to unauthorized file access, data theft, or privilege escalation within the WS_FTP Server environment.

🟢

If Mitigated

Limited impact with proper input validation, output encoding, and Content Security Policy headers in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Reflected XSS typically requires user interaction (clicking malicious link) but exploitation is straightforward once payload is crafted.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.7.4 or 8.8.2

Vendor Advisory: https://community.progress.com/s/article/WS-FTP-Server-Critical-Vulnerability-September-2023

Restart Required: Yes

Instructions:

1. Download WS_FTP Server version 8.7.4 or 8.8.2 from Progress Software. 2. Backup current configuration. 3. Run installer to upgrade. 4. Restart WS_FTP Server service. 5. Verify functionality.

🔧 Temporary Workarounds

Disable Ad Hoc Transfer Module

windows

Temporarily disable the vulnerable Ad Hoc Transfer feature if not required

Navigate to WS_FTP Server Admin > Modules > Disable Ad Hoc Transfer

Implement WAF Rules

all

Add XSS protection rules to web application firewall

Add rule to block requests containing <script>, javascript:, or common XSS payload patterns

🧯 If You Can't Patch

  • Implement strict Content Security Policy headers to restrict script execution
  • Use network segmentation to isolate WS_FTP Server from critical systems

🔍 How to Verify

Check if Vulnerable:

Check WS_FTP Server version in Admin interface: Help > About. If version is below 8.7.4 or 8.8.2, system is vulnerable.

Check Version:

In WS_FTP Server Admin: Navigate to Help > About to view version

Verify Fix Applied:

After patching, verify version shows 8.7.4 or 8.8.2 in Help > About. Test Ad Hoc Transfer functionality works normally.

📡 Detection & Monitoring

Log Indicators:

  • Unusual long URLs in access logs
  • Requests containing script tags or javascript: protocol
  • Multiple failed login attempts followed by successful access

Network Indicators:

  • HTTP requests with suspicious parameters in Ad Hoc Transfer URLs
  • Outbound connections to unknown domains after WS_FTP access

SIEM Query:

source="ws_ftp_logs" AND (url="*<script>*" OR url="*javascript:*" OR url="*onerror=*" OR url="*onload=*")

🔗 References

📤 Share & Export