MobileIron 4.5.4 Cross Site Scripting

2013.10.29
Risk: Low
Local: No
Remote: No
CVE: N/A
CWE: CWE-79

MobileIron 4.5.4 Device Registration regpin Cross Site Scripting scip AG Vulnerability ID 10847 (10/28/2013) http://www.scip.ch/en/?vuldb.10847 I. INTRODUCTION MobileIron is a commercial solution to provide secure access to mobile users in corporate environments. More information is available on the official web site at the following URL: http://www.mobileiron.com/ II. DESCRIPTION Pascal Schaufelberger at scip AG found a cross site scripting vulnerability in the older release 4.5.4. An attacker is able to inject arbitrary script code without former authentication. III. SCORING CVSSv2 Base Score: 7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P) CVSSv2 Temp Score: 5.9 (CVSS2#E:POC/RL:OF/RC:C) IV. EXPLOITATION The attack requires access to the device registration form. The attack attempt can be initiated with the following url: https://www.example.com/mifs/c/i/reg/reg.html?regpin=12345"><script>alert('scip')</script> V. IMPACT This is a traditional reflected cross site scripting vulnerability, which allows the injection of arbitrary script code. An attacker might be able to alter the behavior of the web site and might therefore attack visitors. VI. DETECTION Cross site scripting pattern in the regpin field should be detected and eliminated. Most security solutions provide this function out of the box. VII. SOLUTION This issue got fixed in release 5.1.0 without further notification. Current release is 5.8, which has been available since October 2013. VIII. VENDOR RESPONSE The issue has been reported to the vendor via email. The communication was very efficient and friendly. After exchange of technical details the vendor informed that this issue was known already and has been patched without further notice. IX. SOURCES scip AG - Security is our Business http://www.scip.ch scip AG - Vulnerability Database http://www.scip.ch/en/?vuldb.10847 X. DISCLOSURE TIMELINE 2013/09/28 Identification of the vulnerability 2013/10/14 First contact to MobileIron via Twitter 2013/10/15 Got mail address of MobileIron security contact 2013/10/16 Initial confirmation of our submission by MobileIron 2013/10/18 Detailed description of further actions by MobileIron 2013/10/18 Confirmation of next steps by scip AG 2013/10/28 Public disclosure of the advisory XI. CREDITS The vulnerability has been discovered by Pascal Schaufelberger. Pascal Schaufelberger, scip AG, Zuerich, Switzerland pasc-at-scip.ch http://www.scip.ch The disclosure process has been handled by Marc Ruef. Marc Ruef, scip AG, Zuerich, Switzerland maru-at-scip.ch http://www.scip.ch A1. LEGAL NOTICES Copyright (c) 2002-2013 scip AG, Switzerland. Permission is granted for the re-distribution of this alert. It may not be edited in any way without permission of scip AG. The information in the advisory is believed to be accurate at the time of publishing based on currently available information. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect or consequential loss or damage from use of or reliance on this advisory.

References:

http://www.scip.ch/en/?vuldb.10847


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top