The F5 FirePass 1000 SSL VPN application version 5.5, and possibly earlier versions, is vulnerable to Cross-Site Scripting
This advisory has been published following consultation with UK NISCC <http://www.niscc.gov.uk>
The updated version of this advisory can be found on the following link http://www.procheckup.com/Vulner_PR0603b.php
Date Found: 23rd January 2006
Date Public: 27th September 2006
Vulnerable: Version 5.5 and possibly previous versions.
Severity: Medium/High
Authors: Richard Brain [richard.brain [at] procheckup.com]
CVE Candidate: Not assigned
Description:
The F5 FirePass 1000 SSL VPN appliance is vulnerable to Cross-Site Scripting within the sid" field of the "my.acctab.php3" program.
Consequences:
An attacker may be able to cause the execution of malicious script code in the browser of a user who clicks on a link to the F5 FirePass SSL VPN appliance. This type of attack can result in the defacement of a site, or the redirection of confidential information to unauthorised third
parties.
Fix:
This report was investigated by F5 under the following support ticket CR64237.
This flaw has been fixed in version 6.0 of FirePass, and will be fixed in the 5.52 version of FirePass.
Vendor:
http://www.f5.com/
Legal:
Copyright 2006 ProCheckUp Ltd. All rights reserved.
Permission is granted for copying and circulating this Bulletin to the Internet community for the purpose of alerting them to problems, if and only if the Bulletin is not changed or edited in any way, is attributed to ProCheckUp indicating this web page URL, and provided such reproduction and/or distribution is performed for non-commercial purposes.
Any other use of this information is prohibited. ProCheckUp is not liable for any misuse of this information by any third party.