An FBX-5313 issue was discovered in WatchGuard Fireware before 12.0. When a failed login attempt is made to the login endpoint of the XML-RPC interface, if JavaScript code, properly encoded to be consumed by XML parsers, is embedded as value of the user element, the code will be rendered in the context of any logged in user in the Web UI visiting "Traffic Monitor" sections "Events" and "All." As a side effect, no further events will be visible in the Traffic Monitor until the device is restarted.
References
Link | Resource |
---|---|
https://www.sidertia.com/Home/Community/Blog/2017/09/18/Fixed-Fireware-XXE-DOS-and-stored-XSS-vulnerabilities-discovered-by-Sidertia | Exploit Third Party Advisory |
http://seclists.org/bugtraq/2017/Sep/22 | Exploit Mailing List Third Party Advisory |
https://watchguardsupport.secure.force.com/publicKB?type=KBSecurityIssues&SFDCID=kA62A0000000L0HSAU&lang=en_US | Vendor Advisory |
Configurations
Information
Published : 2017-09-20 13:29
Updated : 2017-10-04 10:18
NVD link : CVE-2017-14615
Mitre link : CVE-2017-14615
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
watchguard
- fireware