Release date:
Updated on: 2012-10-03
Affected Systems:
Endian UTM Firewall Appliance Application v2.4.x
Description:
--------------------------------------------------------------------------------
Cve id: CVE-2012-4923
Endian Firewall is an open source Firewall device.
Endian Firewall 2.4 has Multiple XSS vulnerabilities that allow remote attackers to send data to dnat through the createrule parameter. cgi transmits parameters and addrule parameters to dansguardian. cgi parameters and PATH_INFO parameters are passed to openvpn_users.cgi to inject arbitrary Web scripts or HTML.
<* Source: Vulnerability Research Laboratory
Link: http://xforce.iss.net/xforce/xfdb/73330
*>
Test method:
--------------------------------------------------------------------------------
Alert
The following procedures (methods) may be offensive and are intended only for security research and teaching. Users are at your own risk!
Https://www.example.com/cgi-bin/dnat.cgi?createrule=xss]
Https://www.example.com/cgi-bin/dansguardian.cgi?addrule=xss]
Https://www.example.com/cgi-bin/openvpn_users.cgi? = [XSS]
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
Endian
------
Currently, the vendor does not provide patches or upgrade programs. We recommend that users who use the software follow the vendor's homepage to obtain the latest version:
Http://www.endian.com