ID

VAR-200906-0348


CVE

CVE-2009-2119


TITLE

F5 FirePass SSL VPN Login interface cross-site scripting vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2009-003518

DESCRIPTION

Cross-site scripting (XSS) vulnerability in the login interface (my.logon.php3) in F5 FirePass SSL VPN 5.5 through 5.5.2 and 6.0 through 6.0.3 allows remote attackers to inject arbitrary web script or HTML via a base64-encoded xcho parameter. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks. ---------------------------------------------------------------------- Do you have VARM strategy implemented? (Vulnerability Assessment Remediation Management) If not, then implement it through the most reliable vulnerability intelligence source on the market. Implement it through Secunia. For more information visit: http://secunia.com/advisories/business_solutions/ Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com ---------------------------------------------------------------------- TITLE: F5 FirePass Cross-Site Scripting Vulnerability SECUNIA ADVISORY ID: SA35418 VERIFY ADVISORY: http://secunia.com/advisories/35418/ DESCRIPTION: Sjoerd Resink has reported a vulnerability in F5 FirePass, which can be exploited by malicious people to conduct cross-site scripting attacks. Input passed via an unspecified parameter to the login page is not properly sanitised before being returned to the user. The vulnerability is reported in versions 5.5 through 5.5.2. SOLUTION: Upgrade to version 6.0.3 and apply HF-603-3. PROVIDED AND/OR DISCOVERED BY: Sjoerd Resink, Fox-IT BV ORIGINAL ADVISORY: F5 Networks: https://support.f5.com/kb/en-us/solutions/public/10000/100/sol10143.html Fox-IT BV: https://www.fox-it.com/nl/nieuws-en-events/nieuws/laatste-nieuws/nieuwsartikel/f5-firepass-cross-site-scripting-vulnerability/106 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.16

sources: NVD: CVE-2009-2119 // JVNDB: JVNDB-2009-003518 // BID: 35312 // VULHUB: VHN-39565 // PACKETSTORM: 78268 // PACKETSTORM: 78286

AFFECTED PRODUCTS

vendor:f5model:firepass ssl vpnscope:eqversion:6.0.1

Trust: 1.6

vendor:f5model:firepass ssl vpnscope:eqversion:6.0.2

Trust: 1.6

vendor:f5model:firepass ssl vpnscope:eqversion:5.5.2

Trust: 1.6

vendor:f5model:firepass ssl vpnscope:eqversion:5.5

Trust: 1.6

vendor:f5model:firepass ssl vpnscope:eqversion:6.0

Trust: 1.6

vendor:f5model:firepass ssl vpnscope:eqversion:5.5.1

Trust: 1.6

vendor:f5model:firepass ssl vpnscope:eqversion:6.0.3

Trust: 1.6

vendor:f5model:firepass ssl vpnscope:eqversion:5.5 to 5.5.2 and 6.0 to 6.0.3

Trust: 0.8

vendor:f5model:firepass ssl vpnscope:eqversion:0

Trust: 0.3

sources: BID: 35312 // JVNDB: JVNDB-2009-003518 // CNNVD: CNNVD-200906-307 // NVD: CVE-2009-2119

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2009-2119
value: MEDIUM

Trust: 1.0

NVD: CVE-2009-2119
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200906-307
value: MEDIUM

Trust: 0.6

VULHUB: VHN-39565
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2009-2119
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-39565
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-39565 // JVNDB: JVNDB-2009-003518 // CNNVD: CNNVD-200906-307 // NVD: CVE-2009-2119

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.9

sources: VULHUB: VHN-39565 // JVNDB: JVNDB-2009-003518 // NVD: CVE-2009-2119

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200906-307

TYPE

xss

Trust: 0.8

sources: PACKETSTORM: 78268 // PACKETSTORM: 78286 // CNNVD: CNNVD-200906-307

CONFIGURATIONS

sources: JVNDB: JVNDB-2009-003518

PATCH

title:Top Pageurl:http://www.f5.com/products/firepass/

Trust: 0.8

sources: JVNDB: JVNDB-2009-003518

EXTERNAL IDS

db:NVDid:CVE-2009-2119

Trust: 2.8

db:BIDid:35312

Trust: 2.0

db:SECUNIAid:35426

Trust: 1.8

db:SECUNIAid:35418

Trust: 1.8

db:OSVDBid:55040

Trust: 1.7

db:VUPENid:ADV-2009-1570

Trust: 1.7

db:SECTRACKid:1022387

Trust: 1.7

db:JVNDBid:JVNDB-2009-003518

Trust: 0.8

db:XFid:51064

Trust: 0.6

db:BUGTRAQid:20090611 F5 FIREPASS CROSS-SITE SCRIPTING VULNERABILITY

Trust: 0.6

db:CNNVDid:CNNVD-200906-307

Trust: 0.6

db:VULHUBid:VHN-39565

Trust: 0.1

db:PACKETSTORMid:78268

Trust: 0.1

db:PACKETSTORMid:78286

Trust: 0.1

sources: VULHUB: VHN-39565 // BID: 35312 // JVNDB: JVNDB-2009-003518 // PACKETSTORM: 78268 // PACKETSTORM: 78286 // CNNVD: CNNVD-200906-307 // NVD: CVE-2009-2119

REFERENCES

url:https://www.fox-it.com/nl/nieuws-en-events/nieuws/laatste-nieuws/nieuwsartikel/f5-firepass-cross-site-scripting-vulnerability/106

Trust: 1.8

url:http://www.securityfocus.com/bid/35312

Trust: 1.7

url:https://www.fox-it.com/uploads/pdf/advisory_xss_f5_firepass.pdf

Trust: 1.7

url:http://osvdb.org/55040

Trust: 1.7

url:http://www.securitytracker.com/id?1022387

Trust: 1.7

url:http://secunia.com/advisories/35418

Trust: 1.7

url:http://secunia.com/advisories/35426

Trust: 1.7

url:http://www.vupen.com/english/advisories/2009/1570

Trust: 1.7

url:http://www.securityfocus.com/archive/1/504232/100/0/threaded

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/51064

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2119

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-2119

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/51064

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/504232/100/0/threaded

Trust: 0.6

url:https://www.fox-it.com/en/news-and-events/news/recent-news/news-article/f5-firepass-cross-site-scripting-vulnerability/105

Trust: 0.3

url:http://f5.com/products/firepass/

Trust: 0.3

url:/archive/1/504232

Trust: 0.3

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.2

url:http://secunia.com/advisories/business_solutions/

Trust: 0.2

url:http://secunia.com/advisories/35418/

Trust: 0.2

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.2

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.2

url:http://secunia.com/advisories/35426/

Trust: 0.1

url:https://support.f5.com/kb/en-us/solutions/public/10000/100/sol10143.html

Trust: 0.1

sources: VULHUB: VHN-39565 // BID: 35312 // JVNDB: JVNDB-2009-003518 // PACKETSTORM: 78268 // PACKETSTORM: 78286 // CNNVD: CNNVD-200906-307 // NVD: CVE-2009-2119

CREDITS

Sjoerd Resink

Trust: 0.9

sources: BID: 35312 // CNNVD: CNNVD-200906-307

SOURCES

db:VULHUBid:VHN-39565
db:BIDid:35312
db:JVNDBid:JVNDB-2009-003518
db:PACKETSTORMid:78268
db:PACKETSTORMid:78286
db:CNNVDid:CNNVD-200906-307
db:NVDid:CVE-2009-2119

LAST UPDATE DATE

2024-11-23T22:39:32.448000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-39565date:2018-10-10T00:00:00
db:BIDid:35312date:2009-07-08T20:56:00
db:JVNDBid:JVNDB-2009-003518date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200906-307date:2009-06-19T00:00:00
db:NVDid:CVE-2009-2119date:2024-11-21T01:04:10.393

SOURCES RELEASE DATE

db:VULHUBid:VHN-39565date:2009-06-18T00:00:00
db:BIDid:35312date:2009-06-11T00:00:00
db:JVNDBid:JVNDB-2009-003518date:2012-06-26T00:00:00
db:PACKETSTORMid:78268date:2009-06-11T11:55:33
db:PACKETSTORMid:78286date:2009-06-11T14:21:39
db:CNNVDid:CNNVD-200906-307date:2009-06-18T00:00:00
db:NVDid:CVE-2009-2119date:2009-06-18T21:30:00.407