CVE-2017-18014
moderate-risk
Published 2018-01-12
An NC-25986 issue was discovered in the Logging subsystem of Sophos XG Firewall with SFOS before 17.0.3 MR3. An unauthenticated user can trigger a persistent XSS vulnerability found in the WAF log page (Control Center -> Log Viewer -> in the filter option "Web Server Protection") in the webadmin interface, and execute any action available to the webadmin of the firewall (e.g., creating a new user, enabling SSH, or adding an SSH authorized key). The WAF log page will execute the "User-Agent" parameter in the HTTP POST request.
Do I need to act?
-
0.18% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
6
CVSS 6.1/10
Medium
NETWORK
/ LOW complexity
Affected Vendors
References (8)
Mailing List
http://seclists.org/fulldisclosure/2018/Jan/24
Vendor Advisory
https://community.sophos.com/kb/en-us/128024
Mailing List
http://seclists.org/fulldisclosure/2018/Jan/24
Vendor Advisory
https://community.sophos.com/kb/en-us/128024
34
/ 100
moderate-risk
Severity
23/34 · High
Exploitability
1/34 · Minimal
Exposure
10/34 · Low