Secunia Research has discovered a vulnerability in My Firewall Plus, which can be exploited by malicious, local users to manipulate the content of arbitrary files on a vulnerable system.
The vulnerability is caused due to the Log Viewer's export functionality saving log files without dropping its privileges first. This can be exploited to corrupt arbitrary files on the system with logging information.
Successful exploitation requires that the user has access to the Log Viewer (all users by default).
The vulnerability has been confirmed in version 5.0 (build 1117). Other versions may also be affected.
NOTE: This vulnerability has been rated "Not critical" as only trusted users should have access to the configuration and logging functionality.
Solution: Update to version 5.0 (build 1119) or apply patch.
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to email@example.com
Subject: My Firewall Plus Arbitrary File Corruption Vulnerability
No posts yet
You must be logged in to post a comment.
Secunia Customer Login
Not a customer already?
Learn more about how our market leading Vulnerability Management solutions can help you manage risk and ensure compliance.