An FBX-5313 issue was discovered in WatchGuard Fireware before 12.0. When a failed login attempt is made to the login endpoint of the XML-RPC interface, if JavaScript code, properly encoded to be consumed by XML parsers, is embedded as value of the user element, the code will be rendered in the context of any logged in user in the Web UI visiting "Traffic Monitor" sections "Events" and "All." As a side effect, no further events will be visible in the Traffic Monitor until the device is restarted.
References
Link | Resource |
---|---|
http://seclists.org/bugtraq/2017/Sep/22 | Exploit Mailing List Third Party Advisory |
https://watchguardsupport.secure.force.com/publicKB?type=KBSecurityIssues&SFDCID=kA62A0000000L0HSAU&lang=en_US | Vendor Advisory |
https://www.sidertia.com/Home/Community/Blog/2017/09/18/Fixed-Fireware-XXE-DOS-and-stored-XSS-vulnerabilities-discovered-by-Sidertia | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2017-09-20 20:29
Updated : 2024-02-04 19:29
NVD link : CVE-2017-14615
Mitre link : CVE-2017-14615
CVE.ORG link : CVE-2017-14615
JSON object : View
Products Affected
watchguard
- fireware
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')