Applies To:

Show Versions Show Versions

sol7498: Cross-site scripting vulnerability in download_plugin.php3 page
Security AdvisorySecurity Advisory

Original Publication Date: 05/18/2007
Updated Date: 04/15/2015

The vulnerability described in this article has been resolved, or does not affect any F5 products. There will be no further updates, unless new information is discovered.

Note: Versions that are not listed in this article have not been evaluated for vulnerability to this security advisory. For information about the F5 security policy regarding evaluating older and unsupported versions of F5 products, refer to SOL4602: Overview of the F5 security vulnerability response policy.

F5 products and versions that have been evaluated for this Security Advisory

Product Affected Not Affected
BIG-IP LTM None 9.x
BIG-IP GTM None 9.x
BIG-IP ASM None 9.x
BIG-IP Link Controller None 9.x
BIG-IP WebAccelerator None 9.x
BIG-IP PSM None 9.x
BIG-IP WAN Optimization None 10.x
BIG-IP APM None 10.x
BIG-IP Edge Gateway None 10.x
BIG-IP SAM None 8.0.0
FirePass 5.4.0 - 5.5.2
6.0.0 - 6.0.1  
5.0.0 - 5.2.1
6.0.2 - 6.0.3
Enterprise Manager None 1.x

A cross-site scripting (XSS) vulnerability exists in the FirePass download_plugin.php3 page, which is accessible prior to authentication. For example:

The download_plugin.php3 page fails to fully sanitize URL input before the web page content is sent to the browser. It is possible for an attacker to create web pages or emails with URLs that include executable code or other malicious data containing a hyperlink to the vulnerable download_plugin.php3 page on the FirePass controller.

If you follow the hyperlink to the FirePass controller, the affected web page will be returned to your browser with the malicious content. This could result in malicious code execution on the client side, disclosure of sensitive information, or other exploits.

Information about this advisory is available at the following location:

F5 Product Development tracked this issue as CR78967 and it was fixed in FirePass 6.0.2. For information about upgrading, refer to the FirePass Release Notes.

Obtaining and installing patches

If upgrading is not an immediate option, this vulnerability has been fixed in the following hotfixes. You can download these patches from the F5 Downloads site for the following products and versions:

Product Version Hotfix Installation File
FirePass 5.5.0 - 5.5.1 Hotfix HF-60073-78967-1 HF-60073-78967-1-5.5-ALL-0.tar.gz.enc
5.5.2 Cumulative Hotfix 552-9 HF-552-9-5.52-ALL-0.tar.gz.enc
6.0.0 Cumulative Hotfix 600-14 HF-600-14-6.0-ALL-0.tar.gz.enc
6.0.1 Cumulative Hotfix HF-601-3 HF-601-4-6.01-ALL-0.tar.gz.enc

Note: For more information about installing the hotfixes listed above, refer to the readme file on the F5 Downloads site for your version-specific hotfix.

For information about downloading software, refer to SOL167: Downloading software from F5.

Was this resource helpful in solving your issue?

NOTE: Please do not provide personal information.

Incorrect answer. Please try again: Please enter the words to the right: Please enter the numbers you hear:

Additional Comments (optional)