F5 FirePass 4100 prior 6.x multiple Cross Site Scripting

2006.07.18
Credit: Marc Ruef
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79


CVSS Base Score: 2.6/10
Impact Subscore: 2.9/10
Exploitability Subscore: 4.9/10
Exploit range: Remote
Attack complexity: High
Authentication: No required
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

F5 FirePass 4100 prior 6.x multiple Cross Site Scripting scip AG Vulnerability ID 2352 (07/04/2006) http://www.scip.ch/cgi-bin/smss/showadvf.pl?id=2352 I. INTRODUCTION F5 FirePass is an appliance which allows a remote communication between SSL-VPN endpoints. This secure connectivity to corporate applications and data is provided using a standard web browser. More Information are available on the official FirePass product web site at the following URL: http://www.f5.com/products/FirePass/ II. DESCRIPTION Marc Ruef found several cross site scripting vulnerabilities in the F5 FirePass 4100 prior 6.x - Other versions might be affected too. Some writable form fields and hidden fields can be tricked by using hyphens to include and execute mobile script code. This flaw can be used to pass the code into another users browser session. [1] III. EXPLOITATION Classic script injection techniques within a browser session can be used to exploit this vulnerability. A plugin for our open-source exploiting framework "Attack Tool Kit" (ATK) will be published in the near future. [2] IV. IMPACT Because authentication frontends are affected too, this vulnerability is serious for every secure environment. Non-authenticated users might be able to exploit this flaw to gain elevated privileges (e.g. extracting sensitive cookie information or launch a buffer overflow attack against another web browser). V. DETECTION Detection of web based attacks requires a specialized web proxy and/or intrusion detection system. Patterns for such a detection are available and easy to implement. VI. SOLUTION The vulnerabilities have been identified in version 5.x. The remaining existence of them could not be verified in version 6.x. VII. VENDOR RESPONSE F5 has not been informed because it looks like they have already fixed the problem in version 6.x. VIII. SOURCES scip AG - Security Consulting Information Process (german) http://www.scip.ch scip AG Vulnerability Database (german) http://www.scip.ch/cgi-bin/smss/showadvf.pl?id=2352 computec.ch document data base (german) http://www.computec.ch/download.php IX. DISCLOSURE TIMELINE 06/08/06 Identification of the flaw 06/23/06 Falsification in version 6.x 07/04/06 Public advisory IX. CREDITS The vulnerability was discovered by Marc Ruef. Marc Ruef, scip AG, Zuerich, Switzerland maru-at-scip.ch http://www.scip.ch A1. BIBLIOGRAPHY [1] http://www.computec.ch/download.php?list.26 (german) [2] http://www.computec.ch/projekte/atk/ A2. LEGAL NOTICES Copyright (c) 2006 scip AG, Switzerland. Permission is granted for the re-distribution of this alert. It may not be edited in any way without permission of scip AG. The information in the advisory is believed to be accurate at the time of publishing based on currently available information. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect or consequential loss or damage from use of or reliance on this advisory.


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2022, cxsecurity.com

 

Back to Top