Biscom Secure File Transfer is vulnerable to AngularJS expression injection in the Display Name field. An authenticated user can populate this field with a valid AngularJS expression, wrapped in double curly-braces ({{ }}). This expression will be evaluated by any other authenticated user who views the attacker's display name. Affected versions are 5.0.0000 through 5.1.1026. The Issue is fixed in 5.1.1028.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2017-14351 | Biscom Secure File Transfer is vulnerable to AngularJS expression injection in the Display Name field. An authenticated user can populate this field with a valid AngularJS expression, wrapped in double curly-braces ({{ }}). This expression will be evaluated by any other authenticated user who views the attacker's display name. Affected versions are 5.0.0000 through 5.1.1026. The Issue is fixed in 5.1.1028. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: rapid7
Published:
Updated: 2024-08-05T14:55:35.789Z
Reserved: 2017-01-09T00:00:00.000Z
Link: CVE-2017-5246
No data.
Status : Deferred
Published: 2017-07-18T18:29:00.200
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-5246
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD