CVE-2024-1474

7.5 HIGH

📋 TL;DR

This vulnerability allows attackers to inject malicious scripts into the WS_FTP Server administrative interface through user-supplied inputs. When exploited, it enables reflected cross-site scripting attacks that can steal administrator credentials or perform unauthorized actions. Organizations running WS_FTP Server versions before 8.8.5 with the administrative interface exposed are affected.

💻 Affected Systems

Products:
  • WS_FTP Server
Versions: All versions before 8.8.5
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the administrative interface, not the file transfer functionality. Requires attacker to trick authenticated administrator into clicking malicious link.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator session cookies, gain full administrative access to the WS_FTP Server, and potentially compromise the entire server infrastructure or pivot to internal networks.

🟠

Likely Case

Attackers would steal administrator credentials or session tokens, gaining unauthorized access to the WS_FTP administrative interface to modify configurations, create backdoors, or access sensitive files.

🟢

If Mitigated

With proper network segmentation and access controls, impact would be limited to the WS_FTP Server administrative interface only, preventing lateral movement to other systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires social engineering to trick authenticated administrators into clicking malicious links. No authentication bypass required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.8.5

Vendor Advisory: https://community.progress.com/s/article/WS-FTP-Server-Service-Pack-February-2024

Restart Required: Yes

Instructions:

1. Download WS_FTP Server 8.8.5 or later from Progress Software website. 2. Backup current configuration. 3. Run installer to upgrade. 4. Restart WS_FTP Server service. 5. Verify version shows 8.8.5 or higher.

🔧 Temporary Workarounds

Restrict Administrative Interface Access

windows

Limit access to WS_FTP administrative interface to trusted IP addresses only using firewall rules.

netsh advfirewall firewall add rule name="WS_FTP Admin Restrict" dir=in action=allow protocol=TCP localport=8021 remoteip=192.168.1.0/24,10.0.0.0/8

Implement Web Application Firewall

all

Deploy WAF with XSS protection rules to block malicious script injection attempts.

🧯 If You Can't Patch

  • Implement strict Content Security Policy headers to prevent script execution from untrusted sources
  • Disable administrative interface internet access and require VPN for administrative tasks

🔍 How to Verify

Check if Vulnerable:

Check WS_FTP Server version in administrative interface or via registry: HKEY_LOCAL_MACHINE\SOFTWARE\Ipswitch\WS_FTP Server\Version

Check Version:

reg query "HKLM\SOFTWARE\Ipswitch\WS_FTP Server" /v Version

Verify Fix Applied:

Verify version is 8.8.5 or higher in administrative interface and test XSS payloads are properly sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual administrative login patterns
  • Multiple failed login attempts followed by successful login
  • Administrative interface access from unexpected IP addresses

Network Indicators:

  • HTTP requests to administrative interface with script tags or JavaScript in parameters
  • Unusual outbound connections from WS_FTP server

SIEM Query:

source="WS_FTP" AND (url="*<script*" OR param="*javascript:*" OR status=200 AND user_agent="*test*" AND bytes>100000)

🔗 References

📤 Share & Export