lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 11 Jun 2009 14:34:52 +0200 From: "Sjoerd Resink" <resink@...-it.com> To: <bugtraq@...urityfocus.com>, <full-disclosure@...ts.grok.org.uk> Subject: F5 FirePass Cross-Site Scripting vulnerability ======================================= Vulnerability discovered: May 01, 2009 Reported to vendor: May 14, 2009 Fix available: May 28, 2009 ======================================= PRODUCT ------------- F5 Networks FirePass SSL VPN controller provides secure access to corporate applications and data using a standard web browser. More information can be found at: http://www.f5.com/products/firepass/ VULNERABILITY ------------- Fox-IT discovered a Cross-Site Scripting vulnerability in the F5 Networks FirePass SSL VPN controller. No authentication is required to exploit this vulnerability. EXPLOITATION ------------- This vulnerability can be used to execute arbitrary JavaScript code on the computer of a user as if it genuinely originated from the target domain. In order to do this, an attacker would have to lure the user into visiting a specially prepared URL. Pages can be modified in such a way that any data entered into password fields will not only be sent to the F5 FirePass appliance, but also to the attacker. More advanced exploits of XSS also enable attackers to abuse the user's computer as a stepping stone for launching further attacks on the user's internal network. FIX ------------- F5 Networks has released Cumulative HotFix-603-3 for FirePass to address this vulnerability. More information about obtaining and installing this patch can be found at: https://support.f5.com/kb/en-us/solutions/public/10000/100/sol10143.html Thanks to F5 Networks for their quick response regarding this issue. Original report at https://www.fox-it.com/nl/nieuws-en-events/nieuws/laatste-nieuws/nieuwsa rtikel/f5-firepass-cross-site-scripting-vulnerability/106. Details will be released in the near future. _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists