ID

VAR-201204-0135


CVE

CVE-2012-1777


TITLE

F5 FirePass of my.activation.php3 In SQL Injection vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2012-001994

DESCRIPTION

SQL injection vulnerability in my.activation.php3 in F5 FirePass 6.0.0 through 6.1.0 and 7.0.0 allows remote attackers to execute arbitrary SQL commands via the state parameter. FirePass is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. The following versions of FirePass are affected: 6.0 6.0.1 6.0.2 6.0.2.3 6.0.3 6.1 7.0. ---------------------------------------------------------------------- Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch ---------------------------------------------------------------------- TITLE: FirePass Unspecified SQL Injection Vulnerability SECUNIA ADVISORY ID: SA48455 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/48455/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=48455 RELEASE DATE: 2012-03-21 DISCUSS ADVISORY: http://secunia.com/advisories/48455/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/48455/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=48455 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A vulnerability has been reported in FirePass, which can be exploited by malicious people to conduct SQL injection attacks. Certain unspecified input is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. SOLUTION: Install HF-377712-1. PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: http://support.f5.com/kb/en-us/solutions/public/13000/400/sol13463.html OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.16

sources: NVD: CVE-2012-1777 // JVNDB: JVNDB-2012-001994 // BID: 52653 // VULHUB: VHN-55058 // VULMON: CVE-2012-1777 // PACKETSTORM: 111049

AFFECTED PRODUCTS

vendor:f5model:firepassscope:eqversion:7.0.0

Trust: 2.4

vendor:f5model:firepassscope:eqversion:6.0

Trust: 1.9

vendor:f5model:firepassscope:eqversion:6.1.0

Trust: 1.6

vendor:f5model:firepassscope:eqversion:6.0.0 to 6.1.0

Trust: 0.8

vendor:f5model:firepassscope:eqversion:6.0.3

Trust: 0.3

vendor:f5model:firepassscope:eqversion:6.0.2

Trust: 0.3

vendor:f5model:firepassscope:eqversion:6.0.1

Trust: 0.3

vendor:f5model:firepassscope:eqversion:7.0

Trust: 0.3

vendor:f5model:firepassscope:eqversion:6.1

Trust: 0.3

vendor:f5model:firepassscope:eqversion:6.0.2.3

Trust: 0.3

sources: BID: 52653 // JVNDB: JVNDB-2012-001994 // CNNVD: CNNVD-201204-070 // NVD: CVE-2012-1777

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-1777
value: HIGH

Trust: 1.0

NVD: CVE-2012-1777
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201204-070
value: HIGH

Trust: 0.6

VULHUB: VHN-55058
value: HIGH

Trust: 0.1

VULMON: CVE-2012-1777
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2012-1777
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

NVD: CVE-2012-1777
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-55058
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-55058 // VULMON: CVE-2012-1777 // JVNDB: JVNDB-2012-001994 // CNNVD: CNNVD-201204-070 // NVD: CVE-2012-1777

PROBLEMTYPE DATA

problemtype:CWE-89

Trust: 1.9

sources: VULHUB: VHN-55058 // JVNDB: JVNDB-2012-001994 // NVD: CVE-2012-1777

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201204-070

TYPE

sql injection

Trust: 0.7

sources: PACKETSTORM: 111049 // CNNVD: CNNVD-201204-070

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-001994

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-55058

PATCH

title:SOL13463url:http://support.f5.com/kb/en-us/solutions/public/13000/400/sol13463.html

Trust: 0.8

sources: JVNDB: JVNDB-2012-001994

EXTERNAL IDS

db:NVDid:CVE-2012-1777

Trust: 2.9

db:SECUNIAid:48455

Trust: 1.3

db:PACKETSTORMid:111276

Trust: 1.2

db:SECTRACKid:1026834

Trust: 1.1

db:JVNDBid:JVNDB-2012-001994

Trust: 0.8

db:CNNVDid:CNNVD-201204-070

Trust: 0.7

db:BIDid:52653

Trust: 0.5

db:VULHUBid:VHN-55058

Trust: 0.1

db:VULMONid:CVE-2012-1777

Trust: 0.1

db:PACKETSTORMid:111049

Trust: 0.1

sources: VULHUB: VHN-55058 // VULMON: CVE-2012-1777 // BID: 52653 // JVNDB: JVNDB-2012-001994 // PACKETSTORM: 111049 // CNNVD: CNNVD-201204-070 // NVD: CVE-2012-1777

REFERENCES

url:http://support.f5.com/kb/en-us/solutions/public/13000/400/sol13463.html

Trust: 2.2

url:https://www.sec-consult.com/files/20120328-0_f5_firepass_ssl_vpn_unauthenticated_remote_root_v1.0.txt

Trust: 2.1

url:http://seclists.org/fulldisclosure/2012/mar/324

Trust: 1.2

url:http://packetstormsecurity.org/files/111276/f5-firepass-ssl-vpn-6.x-7.x-sql-injection.html

Trust: 1.2

url:http://www.securitytracker.com/id?1026834

Trust: 1.2

url:http://secunia.com/advisories/48455

Trust: 1.2

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/74450

Trust: 1.2

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/74198

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1777

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-1777

Trust: 0.8

url:http://www.f5.com/products/firepass/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/89.html

Trust: 0.1

url:https://www.securityfocus.com/bid/52653

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://packetstormsecurity.com/files/111276/f5-firepass-ssl-vpn-6.x-7.x-sql-injection.html

Trust: 0.1

url:http://secunia.com/advisories/48455/

Trust: 0.1

url:http://secunia.com/psi_30_beta_launch

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=48455

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/48455/#comments

Trust: 0.1

sources: VULHUB: VHN-55058 // VULMON: CVE-2012-1777 // BID: 52653 // JVNDB: JVNDB-2012-001994 // PACKETSTORM: 111049 // CNNVD: CNNVD-201204-070 // NVD: CVE-2012-1777

CREDITS

C. Schwarz of SEC Consult Vulnerability Lab

Trust: 0.3

sources: BID: 52653

SOURCES

db:VULHUBid:VHN-55058
db:VULMONid:CVE-2012-1777
db:BIDid:52653
db:JVNDBid:JVNDB-2012-001994
db:PACKETSTORMid:111049
db:CNNVDid:CNNVD-201204-070
db:NVDid:CVE-2012-1777

LAST UPDATE DATE

2024-11-23T22:02:42.254000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-55058date:2018-01-06T00:00:00
db:VULMONid:CVE-2012-1777date:2018-01-06T00:00:00
db:BIDid:52653date:2012-03-28T23:30:00
db:JVNDBid:JVNDB-2012-001994date:2012-04-06T00:00:00
db:CNNVDid:CNNVD-201204-070date:2012-04-09T00:00:00
db:NVDid:CVE-2012-1777date:2024-11-21T01:37:45.563

SOURCES RELEASE DATE

db:VULHUBid:VHN-55058date:2012-04-05T00:00:00
db:VULMONid:CVE-2012-1777date:2012-04-05T00:00:00
db:BIDid:52653date:2012-03-14T00:00:00
db:JVNDBid:JVNDB-2012-001994date:2012-04-06T00:00:00
db:PACKETSTORMid:111049date:2012-03-21T07:16:23
db:CNNVDid:CNNVD-201204-070date:2012-04-09T00:00:00
db:NVDid:CVE-2012-1777date:2012-04-05T14:55:05.327