Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Device (Router/Bridge/Hub)  >   F5 FirePass Vendors:   F5 Networks
F5 FirePass SSL VPN Include File Bug Lets Remote Users Deny Service and Potentially Execute Arbitrary Code
SecurityTracker Alert ID:  1027832
SecurityTracker URL:
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Dec 4 2012
Impact:   Denial of service via network, Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 7.0.0 HF-70-6 and prior versions
Description:   A vulnerability was reported in F5 FirePass SSL VPN. A remote user can include and execute PHP code on the target system.

The 'CitrixAuth.php' script does not properly validate user-supplied input in the 'sessionId' parameter. A remote user can supply a specially crafted URL to cause the target system to include and execute files located on the target system.

A remote user can also exploit this flaw to view or delete files located on the target system.

The vendor was notified on June 5, 2012.

The original advisory is available at:

S. Viehbock of SEC Consult reported this vulnerability.

Impact:   A remote user can execute PHP code and operating system commands on the target system with the privileges of the target web service.

A remote user can view or delete files on the target system.

Solution:   The vendor has issued a fix (7.0.0 HF-70-7).

The vendor's advisory is available at:

Vendor URL: (Links to External Site)
Cause:   Input validation error, State error

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC