Description
Comodo Dome Firewall 2.7.0 contains a reflected cross-site scripting vulnerability that allows attackers to inject malicious scripts by submitting crafted input to the antispyware endpoint. Attackers can send POST requests with JavaScript payloads in the DNSMASQ_WHITELIST or DNSMASQ_BLACKLIST parameters to execute arbitrary code in users' browsers.
Problem types
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Product status
Credits
Ozer Goker
References
www.exploit-db.com/exploits/46408 (ExploitDB-46408)
cdome.comodo.com/firewall/ (Comodo Dome Firewall Official Homepage)
secure.comodo.com/...?pid=106&license=try&track=9278&af=9278 (Comodo Dome Firewall Purchase Page)
www.vulncheck.com/...ed-cross-site-scripting-via-antispyware (VulnCheck Advisory: Comodo Dome Firewall 2.7.0 Reflected Cross-Site Scripting via antispyware)