lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <5704B4B7.6000003@a2secure.com> Date: Wed, 6 Apr 2016 09:03:19 +0200 From: Manuel Mancera <mmancera@...ecure.com> To: fulldisclosure@...lists.org Subject: [FD] Fireware XTM Web UI - Open Redirect ================================================================ Fireware XTM Web UI - Open Redirect ================================================================ Information -------------------- Name: Fireware XTM Web UI - Open Redirect Affected Software : Fireware XTM Web UI Affected Versions: < 11.10.7 Vendor Homepage : http://www.watchguard.com/ Vulnerability Type : Open Redirect Severity : Low CVE: n/a Product -------------------- Fireware is the operating system of WatchGuard UTM security solutions. It include a web UI to manage the devices. Description -------------------- An open redirect vulnerability has been detected in the login form. This vulnerability allows to an attacker redirect to arbitrary websites through the WatchGuard Fireware XTM Web UI Page. Proof of Concept URL -------------------- https://site:8080/auth/login?username=test&from_page=https://attacker.website/&domain=&password=\..\..\..\..\..\..\..\..\..\..\..\..\..\..\..\..\Windows\system.ini Solution -------------------- Update to the latest release. More info: https://www.watchguard.com/support/release-notes/fireware/11/en-US/#Fireware/en-US/resolved_issues.html?TocPath=_____11 Advisory Timeline -------------------- 15/12/2015 - Informed Vendor about the issue 16/12/2015 - Vendor answer and confirm the issue (BUG89149) 24/03/2016 - Vendor fixed in the latest release. 29/03/2016 - Public disclosure. Credits & Authors -------------------- Manuel Mancera (@sinkmanu) www.a2secure.com Disclaimer ------------------- All information is provided without warranty. The intent is to provide information to secure infrastructure and/or systems, not to be able to attack or damage. Therefore A2Secure shall not be liable for any director indirect damages that might be caused by using this information. _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists