Vulnerability Details : CVE-2012-4923
Multiple cross-site scripting (XSS) vulnerabilities in Endian Firewall 2.4 allow remote attackers to inject arbitrary web script or HTML via the (1) createrule parameter to dnat.cgi, (2) addrule parameter to dansguardian.cgi, or (3) PATH_INFO to openvpn_users.cgi.
Vulnerability category: Cross site scripting (XSS)
Products affected by CVE-2012-4923
- cpe:2.3:a:endian:firewall:2.4:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2012-4923
0.34%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 71 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2012-4923
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
NIST |
CWE ids for CVE-2012-4923
-
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-4923
-
http://www.securityfocus.com/bid/52076
Endian Firewall Multiple Cross Site Scripting VulnerabilitiesExploit
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/73330
Endian Firewall dnat.cgi dansguardian.cgi and openvpn_users.cgi cross-site scripting CVE-2012-4923 Vulnerability Report
-
http://packetstormsecurity.org/files/109942/Endian-UTM-Firewall-2.4.x-Cross-Site-Scripting.html
Endian UTM Firewall 2.4.x Cross Site Scripting ≈ Packet StormExploit
-
http://www.vulnerability-lab.com/get_content.php?id=436
Jump to