Advertisement






F5 FirePass Cross-Site Scripting vulnerability

CVE Category Price Severity
N/A CWE-79 $1,000 - $5,000 High
Author Risk Exploitation Type Date
Unknown High Remote 2009-06-12
CVSS EPSS EPSSP
CVSS:4.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: http://cxsecurity.com/ascii/WLB-2009060032

Below is a copy:

=======================================
Vulnerability discovered: May 01, 2009
Reported to vendor: May 14, 2009
Fix available: May 28, 2009
=======================================

PRODUCT
-------------
F5 Networks FirePass SSL VPN controller provides secure access to
corporate applications and data using a standard web browser. More
information can be found at:
http://www.f5.com/products/firepass/

VULNERABILITY
-------------
Fox-IT discovered a Cross-Site Scripting vulnerability in the F5
Networks FirePass SSL VPN controller. No authentication is required to
exploit this vulnerability.

EXPLOITATION
-------------
This vulnerability can be used to execute arbitrary JavaScript code on
the computer of a user as if it genuinely originated from the target
domain. In order to do this, an attacker would have to lure the user
into visiting a specially prepared URL. Pages can be modified in such a
way that any data entered into password fields will not only be sent to
the F5 FirePass appliance, but also to the attacker. More advanced
exploits of XSS also enable attackers to abuse the user's computer as a
stepping stone for launching further attacks on the user's internal
network.

FIX
-------------
F5 Networks has released Cumulative HotFix-603-3 for FirePass to address this vulnerability. More information about obtaining and installing this patch can be found at:
https://support.f5.com/kb/en-us/solutions/public/10000/100/sol10143.html

Thanks to F5 Networks for their quick response regarding this issue.

Original report at
https://www.fox-it.com/nl/nieuws-en-events/nieuws/laatste-nieuws/nieuwsartikel/f5-firepass-cross-site-scripting-vulnerability/106. Details will be released in the near future.


Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum