|
Message-ID: <7378c405-5150-ebea-b81d-74f32cff7516@lexfo.fr> Date: Tue, 30 Aug 2022 16:25:12 +0200 From: Charles Fol <c.fol@...fo.fr> To: oss-security@...ts.openwall.com Subject: CVE-2022-31790 CVE-2022-31789: Watchguard XTM/Firebox firewalls: Multiple vulnerabilities Hello, While performing a red-team assessment we discovered a few vulnerabilities on Watchguard firewalls of the XTM/Firebox brand: Here are the different CVEs and WSGA references for the bugs: - Xpath time-based injection in wgcgi: CVE-2022-31790, WSGA-2022-00017 - Integer overflow leading to UAF/overflow in wgagent: CVE-2022-31789, WSGA-2022-00015 - Local privilege escalation from nobody to root: WSGA-2022-00018 Combined, the two latter bugs lead to pre-authentication remote code execution as root on XTM/Firebox devices. Although the second bug is present in both XTM and Firebox models, the exploitation differs as the libc (ptmalloc) version is different, (respectively 2.19 and 2.28). A very in-depth blog-post is available here: https://www.ambionics.io/blog/hacking-watchguard-firewalls References: https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2022-00015 https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2022-00017 https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2022-00018 Regards, Charles
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.