This security advisory describes one low risk vulnerability.
Exploit availability: NoDescription
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks via an SVG document.
The vulnerability exists due to insufficient sanitization of user-supplied data in the FileExplorer component. A remote attacker can use a malicious SVG document, trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.Mitigation
Install update from vendor's website.Vulnerable software versions
FileUltimate: 6.1.0, 6.1.5, 6.2.0, 6.2.5, 6.2.6, 6.3.0, 6.3.5, 6.3.6, 6.3.7, 6.3.8, 6.5.0, 6.5.2, 7.0.0, 7.0.5, 7.0.6, 7.1.0, 7.1.5, 7.2.0, 7.2.5, 7.2.6, 7.2.7, 7.3.0, 7.3.1, 7.3.2, 7.3.5, 7.3.7, 7.4.0, 7.4.2, 7.4.5CPE
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.