McAfee Network Security Manager Cross-Site Scripting (XSS) Vulnerability

2009-11-16 / 2009-11-17
Credit: ctu
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79


Ogólna skala CVSS: 4.3/10
Znaczenie: 2.9/10
Łatwość wykorzystania: 8.6/10
Wymagany dostęp: Zdalny
Złożoność ataku: Średnia
Autoryzacja: Nie wymagana
Wpływ na poufność: Brak
Wpływ na integralność: Częściowy
Wpływ na dostępność: Brak

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 SecureWorks Security Advisory SWRX-2009-001 McAfee Network Security Manager Cross-Site Scripting (XSS) Vulnerability Advisory Information Title: McAfee Network Security Manager Cross-Site Scripting (XSS) Vulnerability Advisory ID: SWRX-2009-001 Advisory URL: http://www.secureworks.com/ctu/advisories/SWRX-2009-001 Date published: Wednesday, November 11, 2009 CVE: CVE-2009-3565 CVSS v2 Base Score: 4.3 (Medium) (AV:N/AC:M/Au:N/C:N/I:P/A:N) Date of last update: Wednesday, November 11, 2009 Vendors contacted: McAfee, Inc. Release mode: Coordinated release Discovered by: Daniel King, SecureWorks Summary McAfee Network Security Manager is vulnerable to cross-site scripting (XSS) caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability using vulnerable parameters in a specially-crafted URL to execute script in a victim?s web browser within the security context of the Network Security Manager site. Affected Products McAfee Network Security Manager (NSM), version 5.1.7.7 (default configuration). It is unknown which other versions, if any, are affected as of November 11, 2009. Vendor Information, Solutions and Workarounds McAfee has provided a new release to address this security flaw. Upgrade NSM software to NSM 5.1.11.6 or above, available for McAfee NSM clients at: https://secure.nai.com/apps/downloads/my_products/login.asp More information is available from McAfee at: McAfee Security Bulletin SB10004 Intrushield NSM update fixes XSS flaw https://kc.mcafee.com/corporate/index?page=content&id=SB10004 Follow best practices of placing the security management console on a segregated management network. Apply restrictive, default-deny firewall policies to protect these assets from access by unauthorized users. Do not perform administrative access of security management consoles from computers exposed to the Internet through web browsing, email, and other applications. Lock down and heavily monitor systems used to perform administrative tasks such as accessing security management consoles. Details User-controllable input supplied by the ?iaction? and ?node? parameters to the ?Login.jsp? page is not properly sanitized for invalid or malicious content prior to being returned to the user in dynamically generated web content. This condition may aid an attacker in retrieving session cookies, stealing recently submitted data, or launching further attacks. SecureWorks Risk Scoring Likelihood: 2 ? Best practice is to deploy the management console web application on a segmented management network. Impact: 5 ? Control over security appliances managed by the management console. CVSS Severity (version 2.0) Access Vector: Network exploitable; Victim must voluntarily interact with attack mechanism Access Complexity: Medium Authentication: Not required to exploit Impact Type: Allows unauthorized modification Confidentiality Impact: None Integrity Impact: Partial Availability Impact: None Impact Subscore: 2.9 Exploitability Subscore: 8.6 CVSS v2 Base Score: 4.3 (Medium) (AV:N/AC:M/Au:N/C:N/I:P/A:N) Proof of Concept The following example URLs demonstrate user-controllable JavaScript being executed in the context of the McAfee Network Security Manager website. https://x.x.x.x/intruvert/jsp/module/Login.jsp?password=&Login%2bID=&nod e=&iaction=precreatefcb14"><script>alert('XSS')</script>8b3283a1e57 https://x.x.x.x/intruvert/jsp/module/Login.jsp?password=&Login%2bID=&nod e=8502a"><script>alert(1)</script>2aa99b60533&iaction=precreatefcb14"><s cript>alert(?XSS?)</script>8b3283a1e57 Revision History 1.0 November 11, 2009 ? Initial advisory release PGP Keys This advisory has been signed with the PGP key of the SecureWorks Counter Threat Unit(SM), which is available for download at http://www.secureworks.com/contact/SecureWorksCTU.asc. About the SecureWorks Counter Threat Unit(SM) Our expert team of threat researchers, also known as the SecureWorks Counter Threat Unit(SM), identifies and analyzes emerging threats and develops countermeasures, correlations and SOC processes to protect clients' critical information assets. The CTU frequently serves as an expert resource for the media, publishes technical analyses for the security community and speaks about emerging threats at security conferences. Leveraging our security technologies and a network of industry contacts, the CTU tracks leading hackers and analyzes anomalous activity, uncovering new attack techniques and threats. This process enables the CTU to identify threats as they emerge and develop countermeasures that protect our clients before damage occurs. About SecureWorks With over 2000 clients, SecureWorks has become one of the leading Security as a Service providers safeguarding more organizations 24x7 than any other vendor. SecureWorks focuses exclusively on information security services and was recently positioned in the Leader's Quadrant in Gartner's Magic Quadrant for Managed Security Services Providers (MSSPs). SecureWorks Security Information and Event Management (SIEM) platform augmented with applied security research and 100% GIAC-certified experts protects clients with our award-winning Managed Security Services and SIM On-Demand solution. Disclaimer Copyright ? 2009 SecureWorks, Inc. This advisory may not be edited or modified in any way without the express written consent of SecureWorks, Inc. If you wish to reprint this advisory or any portion or element thereof, please contact ctu (at) secureworks (dot) com [email concealed] to seek permission. Permission is hereby granted to link to this advisory via the SecureWorks website at http://www.secureworks.com/ctu/advisories/SWRX-2009-001 or use in accordance with the fair use doctrine of U.S. copyright laws. The information within this advisory may change without notice. The most recent version of this advisory may be found on the SecureWorks web site at www.secureworks.com for a limited period of time. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. ANY USE OF THIS INFORMATION IS AT THE USER'S RISK. In no event shall SecureWorks be liable for any damages whatsoever arising out of or in connection with the use or spread of this information. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (MingW32) - WinPT 1.2.0 iQEcBAEBCAAGBQJK+y93AAoJEK0ZvYFWLue8iW4IAIUmyTg0ehNwpYVlBbH3+P3T kzUN4ENDQhgh0JNvd7f7jqtOmhX6Lnacnd4V9WKsCsg2DfW4KgKGre+Wx4qRYIwP 58nrN9Gk3G/Al0xPUvOe/dAlTbpOeVykxEfVkqA4xbUu2/KprAZ8aBP/6W9p62GB DYCZ4xf72dfLnDZtuWRwDGDfp1vMhba9MVPm0b2BcBq9+efT5RPaarMSWriaKEla iNexoajuguN9zes/kfFC15YmC40MCwlIvYlbZ38b8f2JwLvzHhVVMuGZ2hvFhCMa ZHjStWZ7Ac3OigJOkV+ZIDriWQiHyfpFs+rSXzZX6p/WjB3aOgocVRUB4gNcV6s= =xV/4 -----END PGP SIGNATURE-----

Referencje:

http://xforce.iss.net/xforce/xfdb/54250
http://www.vupen.com/english/advisories/2009/3226
http://www.securityfocus.com/bid/37003
http://www.securityfocus.com/archive/1/archive/1/507820/100/0/threaded
http://www.secureworks.com/ctu/advisories/SWRX-2009-001
http://www.osvdb.org/59911
http://securitytracker.com/id?1023171
http://kc.mcafee.com/corporate/index?page=content&id=SB10004


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top