Description
Comodo Dome Firewall 2.7.0 contains multiple reflected cross-site scripting vulnerabilities in the /korugan/proxyconfig endpoint that allow attackers to inject malicious scripts through POST parameters. Attackers can submit crafted POST requests with JavaScript payloads in parameters like PROXY_PORT, VISIBLE_HOSTNAME, ADMIN_MAIL_ADDRESS, CACHE_MEM, MAX_SIZE, MIN_SIZE, and DST_NOCACHE to execute arbitrary scripts in administrator browsers.
Problem types
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Product status
Credits
Ozer Goker
References
www.exploit-db.com/exploits/46408 (ExploitDB-46408)
cdome.comodo.com/firewall/ (Comodo Dome Firewall Homepage)
secure.comodo.com/...?pid=106&license=try&track=9278&af=9278 (Comodo Dome Firewall Purchase Page)
www.vulncheck.com/...ll-cross-site-scripting-via-proxyconfig (VulnCheck Advisory: Comodo Dome Firewall 2.7.0 Cross-Site Scripting via proxyconfig)