ID

VAR-200901-0123


CVE

CVE-2008-5994


TITLE

Check Point Connectra NGX of index.php Vulnerable to cross-site scripting

Trust: 0.8

sources: JVNDB: JVNDB-2009-001640

DESCRIPTION

Cross-site scripting (XSS) vulnerability in index.php in Check Point Connectra NGX R62 HFA_01 allows remote attackers to inject arbitrary web script or HTML via the dir parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. Connectra NGX is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied input data. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks. Connectra NGX R62 HFA_01, Hotfix 601, Builds 006 and 014 are vulnerable; other versions may also be affected. ---------------------------------------------------------------------- Do you need accurate and reliable IDS / IPS / AV detection rules? Get in-depth vulnerability details: http://secunia.com/binary_analysis/sample_analysis/ ---------------------------------------------------------------------- TITLE: Checkpoint Connectra NGX "dir" Cross-Site Scripting Vulnerability SECUNIA ADVISORY ID: SA31553 VERIFY ADVISORY: http://secunia.com/advisories/31553/ CRITICAL: Less critical IMPACT: Cross Site Scripting WHERE: >From remote OPERATING SYSTEM: Check Point Connectra Appliances http://secunia.com/advisories/product/13352/ DESCRIPTION: Sarid Harper has reported a vulnerability in Checkpoint Connectra NGX, which can be exploited by malicious people to conduct cross-site scripting attacks. Input passed to the "dir" parameter in index.php is not properly sanitised before being returned to the user. SOLUTION: Filter malicious characters and character sequences in a proxy. PROVIDED AND/OR DISCOVERED BY: Sarid Harper ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2008-5994 // JVNDB: JVNDB-2009-001640 // BID: 31369 // VULHUB: VHN-36119 // PACKETSTORM: 70280

AFFECTED PRODUCTS

vendor:checkpointmodel:connectra ngxscope:eqversion:r62

Trust: 1.6

vendor:check pointmodel:connectra ngxscope:eqversion:r62 hfa_01

Trust: 0.8

vendor:checkmodel:point software connectra ngx r62scope: - version: -

Trust: 0.3

vendor:checkmodel:point software connectra ngx r62 hfa 01 hotfiscope: - version: -

Trust: 0.3

sources: BID: 31369 // JVNDB: JVNDB-2009-001640 // CNNVD: CNNVD-200901-396 // NVD: CVE-2008-5994

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-5994
value: MEDIUM

Trust: 1.0

NVD: CVE-2008-5994
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200901-396
value: MEDIUM

Trust: 0.6

VULHUB: VHN-36119
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2008-5994
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-36119
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-36119 // JVNDB: JVNDB-2009-001640 // CNNVD: CNNVD-200901-396 // NVD: CVE-2008-5994

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.9

sources: VULHUB: VHN-36119 // JVNDB: JVNDB-2009-001640 // NVD: CVE-2008-5994

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200901-396

TYPE

xss

Trust: 0.7

sources: PACKETSTORM: 70280 // CNNVD: CNNVD-200901-396

CONFIGURATIONS

sources: JVNDB: JVNDB-2009-001640

PATCH

title:Top Pageurl:https://supportcenter.checkpoint.com/supportcenter/index.jsp

Trust: 0.8

sources: JVNDB: JVNDB-2009-001640

EXTERNAL IDS

db:NVDid:CVE-2008-5994

Trust: 2.8

db:BIDid:31369

Trust: 2.0

db:SECUNIAid:31553

Trust: 1.8

db:JVNDBid:JVNDB-2009-001640

Trust: 0.8

db:CNNVDid:CNNVD-200901-396

Trust: 0.7

db:XFid:45385

Trust: 0.6

db:VULHUBid:VHN-36119

Trust: 0.1

db:PACKETSTORMid:70280

Trust: 0.1

sources: VULHUB: VHN-36119 // BID: 31369 // JVNDB: JVNDB-2009-001640 // PACKETSTORM: 70280 // CNNVD: CNNVD-200901-396 // NVD: CVE-2008-5994

REFERENCES

url:http://www.securityfocus.com/bid/31369

Trust: 1.7

url:http://secunia.com/advisories/31553

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/45385

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-5994

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-5994

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/45385

Trust: 0.6

url:http://www.checkpoint.com

Trust: 0.3

url:http://secunia.com/binary_analysis/sample_analysis/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/31553/

Trust: 0.1

url:http://secunia.com/advisories/product/13352/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-36119 // BID: 31369 // JVNDB: JVNDB-2009-001640 // PACKETSTORM: 70280 // CNNVD: CNNVD-200901-396 // NVD: CVE-2008-5994

CREDITS

Sarid Harper

Trust: 0.9

sources: BID: 31369 // CNNVD: CNNVD-200901-396

SOURCES

db:VULHUBid:VHN-36119
db:BIDid:31369
db:JVNDBid:JVNDB-2009-001640
db:PACKETSTORMid:70280
db:CNNVDid:CNNVD-200901-396
db:NVDid:CVE-2008-5994

LAST UPDATE DATE

2025-04-10T23:24:13.619000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-36119date:2017-08-08T00:00:00
db:BIDid:31369date:2015-05-07T17:23:00
db:JVNDBid:JVNDB-2009-001640date:2009-07-08T00:00:00
db:CNNVDid:CNNVD-200901-396date:2009-02-09T00:00:00
db:NVDid:CVE-2008-5994date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-36119date:2009-01-28T00:00:00
db:BIDid:31369date:2008-09-24T00:00:00
db:JVNDBid:JVNDB-2009-001640date:2009-07-08T00:00:00
db:PACKETSTORMid:70280date:2008-09-24T19:14:30
db:CNNVDid:CNNVD-200901-396date:2009-01-28T00:00:00
db:NVDid:CVE-2008-5994date:2009-01-28T15:30:00.407