Description
IPFire 2.21 Core Update 127 contains multiple cross-site scripting vulnerabilities in the ovpnmain.cgi script that allow attackers to inject malicious scripts through VPN configuration parameters. Attackers can submit POST requests with script payloads in parameters like VPN_IP, DMTU, ccdname, ccdsubnet, DOVPN_SUBNET, DHCP_DOMAIN, DHCP_DNS, DHCP_WINS, ROUTES_PUSH, FRAGMENT, KEEPALIVE_1, and KEEPALIVE_2 to execute arbitrary JavaScript in administrator browsers.
Problem types
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Product status
Credits
Ozer Goker
References
www.exploit-db.com/exploits/46344 (ExploitDB-46344)
www.ipfire.org (IPFire Official Website)
downloads.ipfire.org/.../ipfire-2.21.x86_64-full-core127.iso (IPFire 2.21 Core Update 127 Download)
www.vulncheck.com/...-update-cross-site-scripting-via-ovpnma (VulnCheck Advisory: IPFire 2.21 Core Update 127 Cross-Site Scripting via ovpnmain.cgi)