what you don't know can hurt you

Fireware XTM Web UI Open Redirect

Fireware XTM Web UI Open Redirect
Posted Mar 29, 2016
Authored by Manuel Mancera

Fireware XTM Web UI versions prior to 11.10.7 suffer from an open redirection vulnerability.

tags | exploit, web
MD5 | 98d24c058e47ba768e1f552315a0447b

Fireware XTM Web UI Open Redirect

Change Mirror Download
================================================================
Fireware XTM Web UI - Open Redirect
================================================================

Information
--------------------
Name: Fireware XTM Web UI - Open Redirect
Affected Software : Fireware XTM Web UI
Affected Versions: < 11.10.7
Vendor Homepage : http://www.watchguard.com/
Vulnerability Type : Open Redirect
Severity : Low
CVE: n/a


Product
--------------------
Fireware is the operating system of WatchGuard UTM security solutions.
It include a web UI to manage the devices.


Description
--------------------
An open redirect vulnerability has been detected in the login form. This
vulnerability allows to an attacker redirect to arbitrary websites
through the WatchGuard Fireware XTM Web UI Page.


Proof of Concept URL
--------------------
https://site:8080/auth/login?username=test&from_page=https://attacker.website/&domain=&password=\..\..\..\..\..\..\..\..\..\..\..\..\..\..\..\..\Windows\system.ini


Solution
--------------------
Update to the latest release.

More info:
https://www.watchguard.com/support/release-notes/fireware/11/en-US/#Fireware/en-US/resolved_issues.html?TocPath=_____11


Advisory Timeline
--------------------

15/12/2015 - Informed Vendor about the issue
16/12/2015 - Vendor answer and confirm the issue (BUG89149)
24/03/2016 - Vendor fixed in the latest release.
29/03/2016 - Public disclosure.


Credits & Authors
--------------------
Manuel Mancera (@sinkmanu)

www.a2secure.com


Disclaimer
-------------------
All information is provided without warranty. The intent is to provide
information to secure infrastructure and/or systems, not to be able to
attack or damage. Therefore A2Secure shall not be liable for any
director indirect damages that might be caused by using this information.
Login or Register to add favorites

File Archive:

November 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    19 Files
  • 2
    Nov 2nd
    25 Files
  • 3
    Nov 3rd
    8 Files
  • 4
    Nov 4th
    7 Files
  • 5
    Nov 5th
    24 Files
  • 6
    Nov 6th
    0 Files
  • 7
    Nov 7th
    0 Files
  • 8
    Nov 8th
    18 Files
  • 9
    Nov 9th
    9 Files
  • 10
    Nov 10th
    106 Files
  • 11
    Nov 11th
    19 Files
  • 12
    Nov 12th
    13 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    18 Files
  • 16
    Nov 16th
    12 Files
  • 17
    Nov 17th
    15 Files
  • 18
    Nov 18th
    12 Files
  • 19
    Nov 19th
    4 Files
  • 20
    Nov 20th
    2 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    22 Files
  • 23
    Nov 23rd
    14 Files
  • 24
    Nov 24th
    19 Files
  • 25
    Nov 25th
    4 Files
  • 26
    Nov 26th
    1 Files
  • 27
    Nov 27th
    4 Files
  • 28
    Nov 28th
    1 Files
  • 29
    Nov 29th
    11 Files
  • 30
    Nov 30th
    7 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close