F5 FirePass Cross-Site Scripting vulnerability

2009.06.12
Credit: Sjoerd Resink
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79


CVSS Base Score: 4.3/10
Impact Subscore: 2.9/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

======================================= Vulnerability discovered: May 01, 2009 Reported to vendor: May 14, 2009 Fix available: May 28, 2009 ======================================= PRODUCT ------------- F5 Networks FirePass SSL VPN controller provides secure access to corporate applications and data using a standard web browser. More information can be found at: http://www.f5.com/products/firepass/ VULNERABILITY ------------- Fox-IT discovered a Cross-Site Scripting vulnerability in the F5 Networks FirePass SSL VPN controller. No authentication is required to exploit this vulnerability. EXPLOITATION ------------- This vulnerability can be used to execute arbitrary JavaScript code on the computer of a user as if it genuinely originated from the target domain. In order to do this, an attacker would have to lure the user into visiting a specially prepared URL. Pages can be modified in such a way that any data entered into password fields will not only be sent to the F5 FirePass appliance, but also to the attacker. More advanced exploits of XSS also enable attackers to abuse the user's computer as a stepping stone for launching further attacks on the user's internal network. FIX ------------- F5 Networks has released Cumulative HotFix-603-3 for FirePass to address this vulnerability. More information about obtaining and installing this patch can be found at: https://support.f5.com/kb/en-us/solutions/public/10000/100/sol10143.html Thanks to F5 Networks for their quick response regarding this issue. Original report at https://www.fox-it.com/nl/nieuws-en-events/nieuws/laatste-nieuws/nieuwsartikel/f5-firepass-cross-site-scripting-vulnerability/106. Details will be released in the near future.


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top