Description
Comodo Dome Firewall 2.7.0 contains a stored cross-site scripting vulnerability that allows authenticated attackers to inject malicious scripts by submitting crafted input through admin management parameters. Attackers can inject script payloads in the admin_name, name, and surname parameters via POST requests to the /korugan/admins endpoint, which are stored and executed when administrators access the interface.
Problem types
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Product status
Credits
Ozer Goker
References
www.exploit-db.com/exploits/46408 (ExploitDB-46408)
cdome.comodo.com/firewall/ (Comodo Dome Firewall Official Homepage)
secure.comodo.com/...?pid=106&license=try&track=9278&af=9278 (Comodo Dome Firewall Purchase/Trial Page)
www.vulncheck.com/...-stored-cross-site-scripting-via-admins (VulnCheck Advisory: Comodo Dome Firewall 2.7.0 Stored Cross-Site Scripting via admins)