This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

KBA 135412 - Fixing SQL injection vulnerability, impact on SSL VPN

The article suggests disabling HTTPS Admin Services and User Portal access on the WAN interface. While I have never had the Admin Services interface enabled, I have had the User Portal, as this was required to set up remote clients for VPN access. Is this still the case at least with a SSL VPN? If I have the User Portal disabled, will I have to manually send the EXE for the VPN client, and will I have to resend it, if any VPN settings/policies are changed?



This thread was automatically locked due to age.
Parents
  • If you disable the User Portal, you do NOT need to re-send the EXE or anything. I typically have the User Portal enabled on WAN for initial client deployment so they can download it themselves, then I cut it off on the Device Access tab.

    Any webpage with an input field like username/pass such as the User Portal or the Admin login page is exploitable using SQL injection. EDIT: exploitable *IF* input validation was not implemented, and fuzz techniques weren't implemented in Quality Assurance department

  • Hello apalm123,

    it is more than obvious that the developers did nothing like that. It surprises me that this product received EAL4 + certification about two weeks ago.
    Incredibly...

    Regards

    alda

  • Can you check on yours XGs if You can reach user portal even its not selected on WAN interface ?

    Only what i got selected on WAN is SSLVPN BUT i still can access a user portal...

Reply Children