Lucene search

K

dotDefender Firewall 5.00.12865 / 5.13-13282 Cross Site Scripting

🗓️ 09 Feb 2016 00:00:00Reported by hyp3rlinxType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 26 Views

dotDefender Firewall Vulnerability in Versions 5.00.12865 and 5.13-1328

Show more
Related
Code
ReporterTitlePublishedViews
Family
Debian CVE
CVE-2013-1636
12 Mar 201414:55
debiancve
Prion
Cross site scripting
12 Mar 201414:55
prion
Prion
Design/Logic Flaw
2 Jul 201320:55
prion
Packet Storm
WordPress Pretty Link 1.6.3 Cross Site Scripting
21 Feb 201300:00
packetstorm
securityvulns
OSEC-2013-01: nagios metacharacter filtering omission
24 Feb 201300:00
securityvulns
securityvulns
[CVE-2013-1636]Wordpress pretty-link plugin XSS in SWF‏
24 Feb 201300:00
securityvulns
securityvulns
Web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
24 Feb 201300:00
securityvulns
CVE
CVE-2013-1636
12 Mar 201414:55
cve
CVE
CVE-2013-3726
2 Jul 201320:55
cve
Cvelist
CVE-2013-1636
12 Mar 201414:00
cvelist
Rows per page
`[+] Credits: hyp3rlinx  
  
[+] Website: hyp3rlinx.altervista.org  
  
[+] Source:  
http://hyp3rlinx.altervista.org/advisories/DOT-DEFENDER-VULN-FLASH.txt  
  
  
  
Vendor:  
==================  
www.applicure.com  
  
  
  
Product:  
=====================  
dotDefender Firewall  
Versions: 5.00.12865 / 5.13-13282  
  
  
dotDefender is a Web application firewall (WAF) for preventing hacking  
attacks like XSS, SQL Injections, CSRF etc...  
that provides Apache and IIS Server Security across Dedicated, VPS and  
Cloud environments. It meets PCI Compliance and also  
provides E-Commerce Security, IIS and Apache Security, Cloud Security and  
more.  
  
  
  
Vulnerability Type:  
===================  
XSS  
  
  
Vulnerability Details:  
=====================  
Dotdefender firewall is vulnerable to cross site scripting attacks as it  
comes compiled with a vulnerable third party  
Flash based chart application "Open Flash Chart" (CVE-2013-1636) which  
suffers from a well known XSS vulnerability.  
  
Reference:  
http://www.securityfocus.com/bid/59928/exploit  
  
  
  
Exploitation Technique:  
=======================  
Remote  
  
  
  
Severity Level:  
================  
High  
  
  
  
Description:  
========================================================  
  
Request Method(s): [+] GET  
  
  
Vulnerable Product: [+] DotDefender v5.0 & v5.13  
  
  
=========================================================  
  
[+] Disclaimer  
Permission is hereby granted for the redistribution of this advisory,  
provided that it is not altered except by reformatting it, and that due  
credit is given. Permission is explicitly given for insertion in  
vulnerability databases and similar, provided that due credit is given to  
the author.  
The author is not responsible for any misuse of the information contained  
herein and prohibits any malicious use of all security related information  
or exploits by the author or elsewhere.  
  
by hyp3rlinx  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
09 Feb 2016 00:00Current
6.5Medium risk
Vulners AI Score6.5
EPSS0.14009
26
.json
Report