Multiple cross-site scripting (XSS) vulnerabilities exist in the FirePass Administrative Console pages. The affected Administrative Console pages fail to fully sanitize certain URL arguments before the requested web page content is returned to the browser.
These vulnerabilities are only available to authenticated FirePass administrators. It is possible for a remote attacker to create web pages, emails or other media containing hyperlinks to the vulnerable FirePass web pages that include executable code or other malicious data. If an authenticated FirePass administrator follows the hyperlink to the FirePass controller, the affected web page will be returned to the browser with the malicious content. This can result in code execution on the client side, leading to disclosure of sensitive information or other exploits.
Information about this advisory is available at the following location:
F5 Product Development tracked this issue as CR100543 and it was fixed in FirePass version 6.0.3. For information about upgrading, refer to the FirePass release notes.
In addition, cumulative Hotfix HF-602-10 has been issued for FirePass version 6.0.2. You may download this hotfix or later versions of the cumulative hotfix from the F5 Downloads site.
For instructions about obtaining a hotfix, refer to SOL167: Downloading software from F5 Networks.
For instructions about installing a hotfix, refer to SOL3430: Installing FirePass hotfixes.
To reduce exposure to this vulnerability, FirePass administrators should not browse untrusted sites while logged into the FirePass Administrative Console.