SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Router/Bridge/Hub)  >   F5 FirePass Vendors:   F5 Networks
F5 FirePass 1000 Input Validation Flaw in 'my.acctab.php3' Permits Cross-Site Scripting Attacks
SecurityTracker Alert ID:  1017076
SecurityTracker URL:  http://securitytracker.com/id/1017076
CVE Reference:   CVE-2006-5416   (Links to External Site)
Updated:  Jun 3 2008
Original Entry Date:  Oct 17 2006
Impact:   Disclosure of authentication information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): F5 FirePass 1000 version 5.5; possibly earlier versions
Description:   A vulnerability was reported in F5 FirePass 1000. A remote user can conduct cross-site scripting attacks.

The 'my.acctab.php3' script does not properly filter HTML code from user-supplied input in the 'sid' parameter before displaying the input. A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the F5 FirePass device and will run in the security context of that device. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the device, access data recently submitted by the target user via web form to the device, or take actions on the device acting as the target user.

Richard Brain of ProCheckUp reported this vulnerability.

The original advisory is available at:

http://www.procheckup.com/Vulner_PR0603b.php

Impact:   A remote user can access the target user's cookies (including authentication cookies), if any, associated with the F5 FirePass device, access data recently submitted by the target user via web form to the device, or take actions on the device acting as the target user.
Solution:   The vendor has issued a fixed version (6.0).

The vendor also plans to issue a fix in the future release of version 5.52.

Vendor URL:  www.f5.com/products/FirePass/ (Links to External Site)
Cause:   Input validation error

Message History:   None.


 Source Message Contents

Subject:  PR06-03b: F5 Firepass 1000 SSL VPN version 5.5 vulnerable to

The F5 FirePass 1000 SSL VPN application version 5.5, and possibly earlier versions, is vulnerable to Cross-Site Scripting

This advisory has been published following consultation with UK NISCC <http://www.niscc.gov.uk>

The updated version of this advisory can be found on the following link http://www.procheckup.com/Vulner_PR0603b.php

Date Found: 23rd January 2006

Date Public: 27th September 2006

Vulnerable: Version 5.5 and possibly previous versions.

Severity: Medium/High

Authors: Richard Brain [richard.brain [at] procheckup.com]

CVE Candidate: Not assigned

Description:

The F5 FirePass 1000 SSL VPN appliance is vulnerable to Cross-Site Scripting within the sid" field of the "my.acctab.php3" program.

Consequences:

An attacker may be able to cause the execution of malicious script code in the browser of a user who clicks on a link to the F5 FirePass
 SSL VPN appliance. This type of attack can result in the defacement of a site, or the redirection of confidential information to
 unauthorised third 
parties.

Fix:

This report was investigated by F5 under the following support ticket CR64237.

This flaw has been fixed in version 6.0 of FirePass, and will be fixed in the 5.52 version of FirePass.

Vendor:

http://www.f5.com/

Legal:

Copyright 2006 ProCheckUp Ltd. All rights reserved.

Permission is granted for copying and circulating this Bulletin to the Internet community for the purpose of alerting them to problems,
 if and only if the Bulletin is not changed or edited in any way, is attributed to ProCheckUp indicating this web page URL, and provided
 such reproduction and/or distribution is performed for non-commercial purposes.

Any other use of this information is prohibited. ProCheckUp is not liable for any misuse of this information by any third party.

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC