// For flags

CVE-2017-14615

 

Severity Score

6.1
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

An FBX-5313 issue was discovered in WatchGuard Fireware before 12.0. When a failed login attempt is made to the login endpoint of the XML-RPC interface, if JavaScript code, properly encoded to be consumed by XML parsers, is embedded as value of the user element, the code will be rendered in the context of any logged in user in the Web UI visiting "Traffic Monitor" sections "Events" and "All." As a side effect, no further events will be visible in the Traffic Monitor until the device is restarted.

Se ha descubierto un problema FBX-5313 en WatchGuard Fireware en versiones anteriores a la 12.0. Cuando se realiza un intento fallido de inicio de sesión en el punto de conexión de inicio de sesión de la interfaz XML-RPC, si el código JavaScript, codificado para ser consumido por los analizadores sintácticos XML, se embebe como valor del elemento usuario, el código será procesado en el contexto de cualquier usuario que haya iniciado sesión en la interfaz web y que visite las secciones de "Events" y "All" de"Traffic Monitor". Como efecto secundario, no podrán visualizarse más eventos en el monitor de tráfico hasta que se reinicie el dispositivo.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2017-09-20 CVE Reserved
  • 2017-09-20 CVE Published
  • 2023-03-07 EPSS Updated
  • 2024-08-05 CVE Updated
  • 2024-08-05 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Watchguard
Search vendor "Watchguard"
Fireware
Search vendor "Watchguard" for product "Fireware"
<= 11.12.4
Search vendor "Watchguard" for product "Fireware" and version " <= 11.12.4"
-
Affected