F5 Firepass 1000 SSL VPN version 5.5 vulnerable to Cross-Site Scripting

2006.10.20
Credit: Richard Brain
Risk: Low
Local: No
Remote: Yes
CWE: CWE-Other


CVSS Base Score: 5.1/10
Impact Subscore: 6.4/10
Exploitability Subscore: 4.9/10
Exploit range: Remote
Attack complexity: High
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

The F5 FirePass 1000 SSL VPN application version 5.5, and possibly earlier versions, is vulnerable to Cross-Site Scripting This advisory has been published following consultation with UK NISCC <http://www.niscc.gov.uk> The updated version of this advisory can be found on the following link http://www.procheckup.com/Vulner_PR0603b.php Date Found: 23rd January 2006 Date Public: 27th September 2006 Vulnerable: Version 5.5 and possibly previous versions. Severity: Medium/High Authors: Richard Brain [richard.brain [at] procheckup.com] CVE Candidate: Not assigned Description: The F5 FirePass 1000 SSL VPN appliance is vulnerable to Cross-Site Scripting within the sid" field of the "my.acctab.php3" program. Consequences: An attacker may be able to cause the execution of malicious script code in the browser of a user who clicks on a link to the F5 FirePass SSL VPN appliance. This type of attack can result in the defacement of a site, or the redirection of confidential information to unauthorised third parties. Fix: This report was investigated by F5 under the following support ticket CR64237. This flaw has been fixed in version 6.0 of FirePass, and will be fixed in the 5.52 version of FirePass. Vendor: http://www.f5.com/ Legal: Copyright 2006 ProCheckUp Ltd. All rights reserved. Permission is granted for copying and circulating this Bulletin to the Internet community for the purpose of alerting them to problems, if and only if the Bulletin is not changed or edited in any way, is attributed to ProCheckUp indicating this web page URL, and provided such reproduction and/or distribution is performed for non-commercial purposes. Any other use of this information is prohibited. ProCheckUp is not liable for any misuse of this information by any third party.


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2022, cxsecurity.com

 

Back to Top