Accellion

File Transfer Appliance

20 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.33%
  • Published 29.04.2020 23:15:13
  • Last modified 21.11.2024 04:45:15

Accellion File Transfer Appliance version FTA_8_0_540 suffers from an instance of CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection').

  • EPSS 0.35%
  • Published 29.04.2020 23:15:13
  • Last modified 21.11.2024 04:45:15

Accellion File Transfer Appliance version FTA_8_0_540 suffers from an instance of CWE-798: Use of Hard-coded Credentials.

Exploit
  • EPSS 71.21%
  • Published 10.10.2017 13:29:00
  • Last modified 20.04.2025 01:37:25

Directory traversal vulnerability in the template function in function.inc in Accellion File Transfer Appliance devices before FTA_9_11_210 allows remote attackers to read arbitrary files via a .. (dot dot) in the statecode cookie.

Exploit
  • EPSS 85.43%
  • Published 22.08.2017 15:29:00
  • Last modified 20.04.2025 01:37:25

Accellion File Transfer Appliance before FTA_9_11_210 allows remote attackers to execute arbitrary code via shell metacharacters in the oauth_token parameter.

Exploit
  • EPSS 0.24%
  • Published 05.05.2017 18:29:00
  • Last modified 20.04.2025 01:37:25

An issue was discovered on Accellion FTA devices before FTA_9_12_180. There is a home/seos/courier/login.html auth_params CRLF attack vector.

Exploit
  • EPSS 0.29%
  • Published 05.05.2017 18:29:00
  • Last modified 20.04.2025 01:37:25

An issue was discovered on Accellion FTA devices before FTA_9_12_180. Because mysql_real_escape_string is misused, seos/courier/communication_p2p.php allows SQL injection with the app_id parameter.

Exploit
  • EPSS 0.24%
  • Published 05.05.2017 18:29:00
  • Last modified 20.04.2025 01:37:25

An issue was discovered on Accellion FTA devices before FTA_9_12_180. There is XSS in home/seos/courier/smtpg_add.html with the param parameter.

Exploit
  • EPSS 0.32%
  • Published 05.05.2017 18:29:00
  • Last modified 20.04.2025 01:37:25

An issue was discovered on Accellion FTA devices before FTA_9_12_180. Because a regular expression (intended to match local https URLs) lacks an initial ^ character, courier/web/1000@/wmProgressval.html allows SSRF attacks with a file:///etc/passwd#h...

Exploit
  • EPSS 0.13%
  • Published 05.05.2017 18:29:00
  • Last modified 20.04.2025 01:37:25

An issue was discovered on Accellion FTA devices before FTA_9_12_180. By sending a POST request to home/seos/courier/web/wmProgressstat.html.php with an attacker domain in the acallow parameter, the device will respond with an Access-Control-Allow-Or...

Exploit
  • EPSS 0.24%
  • Published 05.05.2017 18:29:00
  • Last modified 20.04.2025 01:37:25

An issue was discovered on Accellion FTA devices before FTA_9_12_180. There is XSS in home/seos/courier/user_add.html with the param parameter.