First published: Sun Mar 16 2014(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in the firewall policy management pages in WatchGuard Fireware XTM before 11.8.3 allow remote attackers to inject arbitrary web script or HTML via the pol_name parameter.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
WatchGuard Fireware OS | <=11.8.1 | |
WatchGuard Fireware OS | =11.6 | |
WatchGuard Fireware OS | =11.6.1 | |
WatchGuard Fireware OS | =11.6.3 | |
WatchGuard Fireware OS | =11.6.5 | |
WatchGuard Fireware OS | =11.6.6 | |
WatchGuard Fireware OS | =11.7 | |
WatchGuard Fireware OS | =11.7.2 | |
WatchGuard Fireware OS | =11.7.3 | |
WatchGuard Fireware OS | =11.7.4 | |
WatchGuard Fireware OS | =11.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Common symptoms include unexpected behavior in firewall policy management pages and potential unauthorized script execution.
To address CVE-2014-0338, upgrade WatchGuard Fireware to version 11.8.3 or later.
CVE-2014-0338 is classified as a medium severity vulnerability due to its potential for exploiting cross-site scripting.
CVE-2014-0338 affects WatchGuard Fireware versions prior to 11.8.3, including 11.6.x and 11.7.x series.
Yes, CVE-2014-0338 can be exploited remotely by attackers injecting malicious scripts through the pol_name parameter.