PR11-07 - Multiple peristent XSS, XSRF, offsite redirection and information disclosure flaws within Check Point/Sofaware firewalls
ProCheckUp Labs are dedicated to conducting research and raising the awareness of information security issues. The combination of ProCheckNet's response-driven AI technology and our experienced security consultants has led to the discovery of many security vulnerabilities and advisories during penetration testing assignments.
In 2008 ProCheckUp published more vulnerabilities than any other UK penetration testing company.
Over the years, ProCheckUp have been credited with finding vulnerabilities and advisories in products from vendors such as:
Microsoft - Aruba Networks - IBM - Novell - BEA Systems - Whale Communications - Netscape - Hummingbird - Apache- F5 Networks - GoAhead - Sun Microsystems
Advisories (Vulnerabilities) & Papers
- Vulnerability found:
- 03 May 2011
- Vendor informed:
- 20 July 2011
- Severity level:
- Richard Brain of ProCheckUp Ltd (www.procheckup.com)
- Check Point/Sofaware firewalls are popular compact UTM (Unified Threat Management) devices, commonly found deployed in corporate satellite offices sometimes even within private households. ProCheckUp has discovered that multiple persistent XSS, XSRF, offsite redirection and information disclosure vulnerabilities exist within these firewalls. Which might allow the protective nature of the firewall to be subverted, placing internal users at risk from attack.
Please read our paper titled "Check Point/SofaWare Firewall Vulnerability Research", for more details on these vulnerabilities.
Tested on versions 7.5.48x, 8.1.46x and 8.2.2x.
1) The following demonstrate the reflective XSS flaws:-
a) The Ufp.html page is vulnerable to a XSS attack via the url parameter
It works by submitting a malicious url parameter to the ufp.html page
This works with firmware versions 7.5.48x, 8.1.46x and 8.2.2x.
b) The login page is also vulnerable to an XSS attack, via a maliciously submitted session cookie
It works by submitting a malicious session cookie to the login page http://192.168.10.1/,
c) An authenticated XSS also exists within the diagnostics command
(this might need to be submitted twice)
An attacker may be able to cause execution of malicious scripting code in the browser of a user who clicks on a link to Check Point firewall hosted page. Such code would run within the security context of the target domain. This type of attack can result in non-persistent defacement of the target site, or the redirection of confidential information (i.e.: session IDs) to unauthorised third parties.
2) The following demonstrate the persistent XSS flaws and XSRF flaws:-
a) The blocked URL warning page is vulnerable to a persistent XSS attack placing any internal users at risk of attack when the page is displayed to them.
First an attacker has to trick the administrator to follow a XSRF attack; the (swsessioncookie) session cookie for simplicity sake is shown though a additional attack can be used to subvert this protection (see paper).
Firewall users then visiting any blocked sites will have the blocked page displayed, which then carries out the attack.
b) Additionally the Wi-Fi hotspot landing page on Wi-Fi enabled firewalls is also vulnerable, with any user using the firewall Wi-Fi access point being at risk of attack.
First an attacker has to trick the administrator to follow a XSRF attack, the (swsessioncookie) session cookie for simplicity sake is shown though a additional attack can be used to subvert this protection (see paper).
Firewall users then visiting the Wi-Fi landing page will then have the attack carried out.
An attacker may be able to cause execution of malicious scripting code in the browser of a user who clicks on a link to Check Point firewall hosted page. Such code would run within the security context of the target domain. Using persistent XSS attacks the attacker does not have to trick his victims to visit his malicious page, as the malicious code is stored by and becomes part of the functionality of the firewall.
3) The following demonstrate the (authenticated) offsite redirection flaws:-
a) Enter the following URL to redirect
b) Enter the following URL and then press back button.
Offsite redirection is typically used to perform phishing type attacks, by fooling an authenticated user to re-enter authentication details in an external site.
4) The following demonstrate the Information disclosure flaws (no authentication needed)
It was found that the /pub/test.html program disclosed information, regarding the patch level used, licensing and the MAC addresses to unauthenticated users.
a) On early firmware versions 5.0.82x, 6.0.72x & 7.0.27x 7.5.48x
Just requesting http:// 192.168.10.1/pub/test.html is sufficient
b) However this no longer worked on versions 8.1.46x & 8.2.26x however adding the URL parameter and a double quote bypassed this check
An attacker may be able to obtain additional information on the machines configuration, and use this information to carry out further attacks.
- How to fix:
- Upgrade to Check Point/Sofaware firmware version 8.2.44 or higher, which solves these vulnerabilities
- Copyright 2012 Procheckup Ltd. All rights reserved.
Permission is granted for copying and circulating this Bulletin to the Internet community for the purpose of alerting them to problems, if and only if, the Bulletin is not edited or changed in any way, is attributed to Procheckup, and provided such reproduction and/or distribution is performed for non-commercial purposes.
Any other use of this information is prohibited. Procheckup is not liable for any misuse of this information by any third party.