CVE-2016-9834

MEDIUM

Sophos Cyberoam Firmware < 10.6.4 - XSS

Title source: rule
STIX 2.1

Description

An XSS vulnerability allows remote attackers to execute arbitrary client side script on vulnerable installations of Sophos Cyberoam firewall devices with firmware through 10.6.4. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of a request to the "LiveConnectionDetail.jsp" application. GET parameters "applicationname" and "username" are improperly sanitized allowing an attacker to inject arbitrary JavaScript into the page. This can be abused by an attacker to perform a cross-site scripting attack on the user. A vulnerable URI is /corporate/webpages/trafficdiscovery/LiveConnectionDetail.jsp.

Exploits (1)

exploitdb WORKING POC
by Bhadresh Patel · textwebappshardware
https://www.exploit-db.com/exploits/42062

References (1)

Core 1
Core References
Mailing List, Third Party Advisory, VDB Entry x_refsource_misc
http://seclists.org/bugtraq/2017/Jun/4

Scores

CVSS v3 6.1
EPSS 0.0012
EPSS Percentile 30.1%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Details

CWE
CWE-79
Status published
Products (1)
sophos/cyberoam_firmware < 10.6.4
Published Jun 07, 2017
Tracked Since Feb 18, 2026