Sophos Cyberoam NG Series Multiple Cross-Site Scripting Vulnerabilities

Title: Sophos Cyberoam NG Series Multiple Cross-Site Scripting Vulnerabilities
Advisory ID: ZSL-2016-5313
Type: Local/Remote
Impact: Cross-Site Scripting
Risk: (2/5)
Release Date: 04.04.2016
Cyberoam NG series of Unified Threat Management appliances are the Next-Generation network security appliances that include UTM security features along with performance required for future networks. The NG series for SMEs are the 'fastest UTMs' made for this segment. The best-in-class hardware along with software to match, enables the NG series to offer unmatched throughput speeds, compared to any other UTM appliance in this market segment. This assures support for future IT trends in organizations like high-speed Internet and rising number of devices in organizations – offering future-ready security to SMEs.
Multiple reflected XSS issues were discovered in Cyberoam NG appliances. Input passed via the 'ipFamily', 'applicationname' and 'username' GET parameters to LiveConnections.jsp and LiveConnectionDetail.jsp is not properly sanitised before being returned to the user. Adding arbitrary 'X-Forwarded-For' HTTP header to a request makes the appliance also prone to a XSS issue. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
Sophos Technologies Pvt. Ltd. -
Affected Version
Model: CR100iNG, FW: 10.6.3 MR-1 (Build 503)
Model: CR35iNG, FW: 10.6.2 MR-1 (Build 383)
Model: CR35iNG, FW: 10.6.2 (Build 378)
Tested On
Vendor Status
[29.01.2016] Vulnerability discovered.
[02.02.2016] Vendor contacted.
[02.02.2016] Vendor responds asking more details.
[02.02.2016] Sent details to the vendor.
[03.02.2016] Vendor asks if the issue is resolved?
[05.02.2016] Asked vendor for status update.
[05.02.2016] Vendor assigns case number 5708861.
[12.02.2016] Asked vendor for status update.
[15.02.2016] Vendor verifies the vulnerability asigning defect ID 19644.
[15.02.2016] Vendor will resolve the issue in an upcoming release.
[28.02.2016] Asked vendor to provide more concrete information.
[29.02.2016] Vendor replies.
[14.03.2016] Asked vendor for scheduled patch release date.
[03.04.2016] No response from the vendor.
[04.04.2016] Public security advisory released.
Vulnerability discovered by Gjoko Krstic - <>
[04.04.2016] - Initial release
[05.04.2016] - Added reference [2] and [3]
[06.04.2016] - Added reference [4]
[11.04.2016] - Added reference [5], [6], [7], [8] and [9]
Zero Science Lab