Modification of system information in Microsoft Forefront Unified Access Gateway



Published: 2018-07-06
Risk Low
Patch available NO
Number of vulnerabilities 1
CVE-ID CVE-2018-12571
CWE-ID CWE-20
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Microsoft Forefront Unified Access Gateway
Server applications / IDS/IPS systems, Firewalls and proxy servers

Vendor Microsoft

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Improper input validation

EUVDB-ID: #VU13594

Risk: Low

CVSSv3.1: 6.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N/E:U/RL:U/RC:C]

CVE-ID: CVE-2018-12571

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to modify system information on the target system.

The vulnerability exists due to an error when processing malicious input. A remote attacker can submit a specially crafted 'orig_url' parameter value that includes a comma-separated list of URLs and cause the target server to initiate DNS queries for the hosts specified in the URLs.

Mitigation

The vendor does not plan to issue a fix as part of a security update.

Vulnerable software versions

Microsoft Forefront Unified Access Gateway: 2010

External links

http://seclists.org/fulldisclosure/2018/Jul/7


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###