Description
Comodo Dome Firewall 2.7.0 contains a reflected cross-site scripting vulnerability that allows attackers to inject malicious scripts by submitting crafted input to the protocol parameter. Attackers can send POST requests to the QoS rules management endpoint with JavaScript payloads in the protocol parameter to execute arbitrary code in administrator browsers.
Problem types
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Product status
Credits
Ozer Goker
References
www.exploit-db.com/exploits/46408 (ExploitDB-46408)
cdome.comodo.com/firewall/ (Comodo Dome Firewall Official Homepage)
secure.comodo.com/...?pid=106&license=try&track=9278&af=9278 (Comodo Dome Firewall Purchase Page)
www.vulncheck.com/...cted-cross-site-scripting-via-qos-rules (VulnCheck Advisory: Comodo Dome Firewall 2.7.0 Reflected Cross-Site Scripting via QoS Rules)