CVE-2024-1474
📋 TL;DR
This vulnerability allows attackers to inject malicious scripts into the WS_FTP Server administrative interface through user-supplied inputs. When exploited, it enables reflected cross-site scripting attacks that can steal administrator credentials or perform unauthorized actions. Organizations running WS_FTP Server versions before 8.8.5 with the administrative interface exposed are affected.
💻 Affected Systems
- WS_FTP Server
📦 What is this software?
Ws Ftp Server by Progress
⚠️ Risk & Real-World Impact
Worst Case
Attackers could steal administrator session cookies, gain full administrative access to the WS_FTP Server, and potentially compromise the entire server infrastructure or pivot to internal networks.
Likely Case
Attackers would steal administrator credentials or session tokens, gaining unauthorized access to the WS_FTP administrative interface to modify configurations, create backdoors, or access sensitive files.
If Mitigated
With proper network segmentation and access controls, impact would be limited to the WS_FTP Server administrative interface only, preventing lateral movement to other systems.
🎯 Exploit Status
Exploitation requires social engineering to trick authenticated administrators into clicking malicious links. No authentication bypass required.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 8.8.5
Vendor Advisory: https://community.progress.com/s/article/WS-FTP-Server-Service-Pack-February-2024
Restart Required: Yes
Instructions:
1. Download WS_FTP Server 8.8.5 or later from Progress Software website. 2. Backup current configuration. 3. Run installer to upgrade. 4. Restart WS_FTP Server service. 5. Verify version shows 8.8.5 or higher.
🔧 Temporary Workarounds
Restrict Administrative Interface Access
windowsLimit access to WS_FTP administrative interface to trusted IP addresses only using firewall rules.
netsh advfirewall firewall add rule name="WS_FTP Admin Restrict" dir=in action=allow protocol=TCP localport=8021 remoteip=192.168.1.0/24,10.0.0.0/8
Implement Web Application Firewall
allDeploy WAF with XSS protection rules to block malicious script injection attempts.
🧯 If You Can't Patch
- Implement strict Content Security Policy headers to prevent script execution from untrusted sources
- Disable administrative interface internet access and require VPN for administrative tasks
🔍 How to Verify
Check if Vulnerable:
Check WS_FTP Server version in administrative interface or via registry: HKEY_LOCAL_MACHINE\SOFTWARE\Ipswitch\WS_FTP Server\Version
Check Version:
reg query "HKLM\SOFTWARE\Ipswitch\WS_FTP Server" /v Version
Verify Fix Applied:
Verify version is 8.8.5 or higher in administrative interface and test XSS payloads are properly sanitized.
📡 Detection & Monitoring
Log Indicators:
- Unusual administrative login patterns
- Multiple failed login attempts followed by successful login
- Administrative interface access from unexpected IP addresses
Network Indicators:
- HTTP requests to administrative interface with script tags or JavaScript in parameters
- Unusual outbound connections from WS_FTP server
SIEM Query:
source="WS_FTP" AND (url="*<script*" OR param="*javascript:*" OR status=200 AND user_agent="*test*" AND bytes>100000)