
{"id":323,"date":"2008-03-07T09:02:08","date_gmt":"2008-03-07T12:02:08","guid":{"rendered":"http:\/\/www.talsoft.com.ar\/site\/?p=323"},"modified":"2008-03-07T09:02:08","modified_gmt":"2008-03-07T12:02:08","slug":"cross-site-scripting-en-check-point-vpn-1-utm-edge","status":"publish","type":"post","link":"https:\/\/www.talsoft.com.ar\/site\/es\/cross-site-scripting-en-check-point-vpn-1-utm-edge\/","title":{"rendered":"Cross-site scripting en Check Point VPN-1 UTM Edge"},"content":{"rendered":"<p>Se ha encontrado una vulnerabilidad en Check Point VPN-1 UTM Edge que<br \/>\npodr\u00c3\u00ada ser explotada por un atacante remoto para realizar ataques de<br \/>\ncross-site scripting.<\/p>\n<p>La vulnerabilidad est\u00c3\u00a1 causada porque la entrada del par\u00c3\u00a1metro \u00abuser\u00bb<br \/>\nen el login no se limpia de forma adecuada antes de ser devuelta al<br \/>\nusuario. Esto podr\u00c3\u00ada ser explotado por un atacante remoto para ejecutar<br \/>\nc\u00c3\u00b3digo JavaScript o HTML arbitrario en el contexto de seguridad de un<br \/>\nnavegador que visita el interfaz web del dispositivo.<\/p>\n<p>La vulnerabilidad est\u00c3\u00a1 confirmada para Check Point VPN-1 Edge con la<br \/>\nversi\u00c3\u00b3n 7.0.48x de NGX y puede afectar a otras versiones. Se recomienda<br \/>\nactualizar a la versi\u00c3\u00b3n 7.5.48 del firmware.<\/p>\n<p>Fuente: Hispasec<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Se ha encontrado una vulnerabilidad en Check Point VPN-1 UTM Edge que podr\u00c3\u00ada ser explotada por un atacante remoto para realizar ataques de cross-site scripting. La vulnerabilidad est\u00c3\u00a1 causada porque la entrada del par\u00c3\u00a1metro \u00abuser\u00bb en el login no se limpia de forma adecuada antes de ser devuelta al usuario. Esto podr\u00c3\u00ada ser explotado por [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[4],"tags":[],"class_list":["post-323","post","type-post","status-publish","format-standard","hentry","category-noticias"],"_links":{"self":[{"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/posts\/323","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/comments?post=323"}],"version-history":[{"count":0,"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/posts\/323\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/media?parent=323"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/categories?post=323"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/tags?post=323"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}