Vulnerability Description
Comodo Dome Firewall 2.7.0 contains multiple reflected cross-site scripting vulnerabilities in the /korugan/proxyconfig endpoint that allow attackers to inject malicious scripts through POST parameters. Attackers can submit crafted POST requests with JavaScript payloads in parameters like PROXY_PORT, VISIBLE_HOSTNAME, ADMIN_MAIL_ADDRESS, CACHE_MEM, MAX_SIZE, MIN_SIZE, and DST_NOCACHE to execute arbitrary scripts in administrator browsers.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Comodo | Dome Firewall | <= 2.7.0 |
Related Weaknesses (CWE)
References
- https://cdome.comodo.com/firewall/Product
- https://secure.comodo.com/home/purchase.php?pid=106&license=try&track=9278&af=92Not Applicable
- https://www.exploit-db.com/exploits/46408ExploitThird Party Advisory
- https://www.vulncheck.com/advisories/comodo-dome-firewall-cross-site-scripting-vThird Party Advisory
FAQ
What is CVE-2019-25423?
CVE-2019-25423 is a vulnerability with a CVSS score of 6.1 (MEDIUM). Comodo Dome Firewall 2.7.0 contains multiple reflected cross-site scripting vulnerabilities in the /korugan/proxyconfig endpoint that allow attackers to inject malicious scripts through POST parameter...
How severe is CVE-2019-25423?
CVE-2019-25423 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-25423?
Check the references section above for vendor advisories and patch information. Affected products include: Comodo Dome Firewall.