vendor:
SecFlow-1v
by:
Jonatan Schor and Uriel Yochpaz
6.1
CVSS
MEDIUM
Stored-XSS
79
CWE
Product Name: SecFlow-1v
Affected Version From: SF_0290_2.3.01.26
Affected Version To: SF_0290_2.3.01.26
Patch Exists: YES
Related CWE: CVE-2020-13260
CPE: a:rad:secflow-1v
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: RAD SecFlow-1v
2020
RAD SecFlow-1v SF_0290_2.3.01.26 – Persistent Cross-Site Scripting
A Stored-XSS vulnerability was found in multiple pages in the web-based management interface of RAD SecFlow-1v. An attacker could exploit this vulnerability by uploading a malicious file as the OVPN file in Configuration-Services-Security-OpenVPN-Config or as the static key file in Configuration-Services-Security-OpenVPN-Static Keys. These files content is presented to users while executing malicious stored JavaScript code. This could be exploited in conjunction with CVE-2020-13259.
Mitigation:
Upload a file containing the following JS code: <img src=x onerror=alert(1)> Refresh the page and observe the malicious JS code execute every time you browse the compromised page.