Sophos UTM URL Reflected Cross Site Scripting Vulnerability

Published: 2016-03-04 13:06:07

CVSS Base Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:N

Detection Type:
remote_active

Summary:
This host is installed with Sophos UTM and is prone to reflected cross site scripting Vulnerability.

Detection Method:
Send a crafted request via HTTP GET and check whether it is able to read cookie or not.

Technical Details:
The flaw is due to an insufficient validation of user supplied input via the 'url' of a web site protected by Sophos UTM 525.

Impact:
Successful exploitation will allow remote attackers to execute arbitrary script code in a user's browser session, read arbitrary files and to trigger specific actions.

Affected Versions:
Sophos UTM version 9.352-6 and 94988

Recommendations:
Upgrade to Sophos UTM 9.354 or later.

Solution Type:
Vendor Patch

References:

http://www.securityfocus.com/archive/1/537662
https://packetstormsecurity.com/files/136019/SYSS-2016-009.txt
https://www.sophos.com

Search
Severity
Medium
CVSS Score
4.3

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities. It is free and always will be.