SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Router/Bridge/Hub)  >   F5 FirePass Vendors:   F5 Networks
F5 FirePass Input Validation Hole in 'css_exceptions' and 'sql_matchscope' Parameters Permits Cross-Site Scripting Attacks
SecurityTracker Alert ID:  1020205
SecurityTracker URL:  http://securitytracker.com/id/1020205
CVE Reference:   CVE-2008-2637   (Links to External Site)
Updated:  Jun 13 2008
Original Entry Date:  Jun 6 2008
Impact:   Disclosure of authentication information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information
Exploit Included:  Yes  
Version(s): 6.0.2, hotfix 3; possibly other versions
Description:   A vulnerability was reported in F5 FirePass. A remote user can conduct cross-site scripting attacks.

Several scripts do not properly filter HTML code from user-supplied input before displaying the input. A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the F5 FirePass device and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

The 'css_exceptions' parameter in '/vdesk/admincon/webyfiers.php' and the 'sql_matchscope' parameter in '/vdesk/admincon/index.php' are affected.

Some demonstration exploit URLs are provided:

https://[target]/vdesk/admincon/webyfiers.php?
a=css&click=1
&css_exceptions=%22+onfocus%3Dalert%28%26quot%3BXSS1%26quot%3B%29+foo%3D%22
&save_css_exceptions=Update

https://[target]/vdesk/admincon/index.php?
a=css⊂=sql
&sql_matchscope=%22+onfocus%3Dalert%28%26quot%3BXSS2%26quot%3B%29+foo%3D%22
&save_sql_matchscope=Update

nnposter reported this vulnerability.

Impact:   A remote user can access the target user's cookies (including authentication cookies), if any, associated with the F5 FirePass device, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.
Solution:   No solution was available at the time of this entry.
Vendor URL:  www.f5.com/products/firepass/ (Links to External Site)
Cause:   Input validation error

Message History:   None.


 Source Message Contents

Subject:  F5 FirePass Content Inspection Management XSS

F5 FirePass Content Inspection Management XSS


Product: F5 FirePass
http://www.f5.com/products/firepass/


The F5 FirePass SSL VPN appliance provides rudimentary web request sanitization for resources exposed through the appliance via Portal
 Access. This Content Inspection feature can be configured and customized through the web management interface to optimize protection
 against cross-site scripting and SQL injection. The "XSS scripting" configuration page even prominently states the following:

"The FirePass can aid in preventing Cross Site Scripting attacks via vulnerable web servers. This is done by scanning URL arguments
 and form POST data sent by users through Web Applications, and blocking the request if it looks suspicious. Note that the FirePass
 user and admin console interfaces are already protected against Cross Site Scripting attacks."

Ironically these very pages contain cross-site scripting vulnerabilities. Specifically, parameter css_exceptions in page /vdesk/admincon/webyfiers.php
 and parameter sql_matchscope in page /vdesk/admincon/index.php are vulnerable due to incorrect handling of quotes. This allows an
 attacker to force premature termination of the parameter value and to inject an event handler script. This injection is permanent
 because it is embedded in the parameter value. At the same time it is possible to remove (also permanently) the "Update" button on
 the web form, which complicates the injection removal.


Examples:

https://(target)/vdesk/admincon/webyfiers.php?
a=css&click=1
&css_exceptions=%22+onfocus%3Dalert%28%26quot%3BXSS1%26quot%3B%29+foo%3D%22
&save_css_exceptions=Update

https://(target)/vdesk/admincon/index.php?
a=css&sub=sql
&sql_matchscope=%22+onfocus%3Dalert%28%26quot%3BXSS2%26quot%3B%29+foo%3D%22
&save_sql_matchscope=Update


The vulnerability has been identified in version 6.0.2, hotfix 3. However, other versions may be also affected.


Solution:
Users should not browse untrusted sites while logged into the FirePass management interface.


Found by:
nnposter

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC