CVE-2020-37032

Wing · Wing FTP Server

A high-severity vulnerability exists in Wing FTP Server that allows an authenticated attacker to take control of the administrative interface.

Executive summary

A high-severity vulnerability exists in Wing FTP Server that allows an authenticated attacker to take control of the administrative interface. By uploading a file with a malicious name, an attacker can execute code in an administrator's web browser, potentially leading to a full server compromise, data theft, and unauthorized system changes. Due to the public availability of exploit code, this vulnerability poses a significant and immediate risk.

Vulnerability

This vulnerability is a stored Cross-Site Scripting (XSS) flaw within the Wing FTP Server's web administration interface. An attacker with valid, even low-privileged, user credentials can upload a file with a specially crafted filename containing malicious JavaScript code. The server fails to properly sanitize this filename when displaying it in the administrative file browser. When a privileged user, such as an administrator, views the list of uploaded files, the malicious script executes within the context of their browser session, granting the attacker the ability to perform any action the administrator can, such as creating new admin accounts, modifying server settings, or accessing/deleting sensitive files.

Business impact

This vulnerability is rated as High severity with a CVSS score of 8.8. Successful exploitation could lead to a complete compromise of the FTP server and the data it hosts. The primary business impacts include a high risk of a data breach, loss of data integrity, and potential disruption of business operations that rely on the FTP server. An attacker gaining administrative control could exfiltrate sensitive corporate or customer data, install malware, or use the compromised server as a pivot point to launch further attacks against the internal network, leading to significant financial and reputational damage.

Remediation

Immediate Action: Apply vendor security updates immediately to upgrade Wing FTP Server to a patched version that resolves this vulnerability. After patching, it is crucial to monitor for any signs of exploitation that may have occurred prior to remediation and to review administrative access logs for any unauthorized or suspicious activity.

Proactive Monitoring: Security teams should monitor server logs for file upload events with suspicious filenames, specifically looking for HTML tags, script elements (e.g., <script>, onerror=), or other XSS payloads. Network traffic to and from the server's web administration interface should be monitored for anomalous patterns. Implement alerts for unusual administrative actions, such as account creation or privilege escalation, especially from unexpected IP addresses.

Compensating Controls: If immediate patching is not feasible, implement a Web Application Firewall (WAF) with rules designed to detect and block XSS attacks in file upload parameters. Restrict access to the web administration portal to a limited set of trusted IP addresses. Enforce multi-factor authentication (MFA) for all administrative accounts to mitigate the risk of session hijacking.

Exploitation status

Public Exploit Available: true

Analyst recommendation

Given the high CVSS score of 8.8 and the public availability of exploit code, we strongly recommend that immediate action be taken to mitigate this vulnerability. Organizations must prioritize the deployment of the vendor-supplied security patches to all affected Wing FTP Server instances. Due to the risk of complete administrative takeover, this vulnerability should be treated as a critical threat to the security of the server and the data it contains.