Skip to main content

F5 FirePass SQL Injection and Redirection Vulnerabilities

Last Update Date: 24 Oct 2012 11:24 Release Date: 24 Oct 2012 5035 Views

RISK: Medium Risk

TYPE: Security software and application - Security Software & Appliance

TYPE: Security Software & Appliance

Multiple vulnerabilities have been identified in F5 FirePass, which can be exploited by malicious people to conduct spoofing and SQL injection attacks.

  1. Input passed via the "refreshURL" parameter to my.activation.cns.php3 is not properly verified before being used to redirect users. This can be exploited to redirect a user to an arbitrary website e.g. when a user clicks a specially crafted link.
  2. Certain unspecified input passed to the FirePass controller is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.

Impact

  • Cross-Site Scripting
  • Spoofing

System / Technologies affected

  • FirePass 6.x
  • FirePass 7.x

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.

  • Update to version 7.0.0 HF-70-7 or 6.1.0 HF-610-9.

Vulnerability Identifier

  • No CVE information is available

Source


Related Link