Matrix42 Service Desk XSS

2013.04.18
Credit: 43zsec
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79


Ogólna skala CVSS: 4.3/10
Znaczenie: 2.9/10
Łatwość wykorzystania: 8.6/10
Wymagany dostęp: Zdalny
Złożoność ataku: Średnia
Autoryzacja: Nie wymagana
Wpływ na poufność: Brak
Wpływ na integralność: Częściowy
Wpływ na dostępność: Brak

CVE ID : CVE-2013-2504 _ Product: Service Store 5.3 SP3 (5.33.946.0) _ Vendor: matrix42 - member of asseco group _ Subject: Cross-site Scripting - XSS _ Classification: PCI 2.0: 6.5.7 PCI 1.2: 6.5.1 OWASP: A2 CWE: 79 CAPEC: 19 WASC: 08 _ Risk: High _ Effect: Remotely exploitable _ Author: 43zsec (43zsec() gmail.com) _ Date: March 6th 2013 _ Dork: inurl:/SPS/Logon/AuthLogon.aspx?ReturnUrl= Productinformation: ------------- Matrix42 Service Desk (description from the Webpage): http://www.matrix42.com/products/it-service-management/service-desk/ A friendly, well-organized customer service is the flagship of every company. As the IT department&#8217;s central point of contact, the helpdesk ensures user productivity. As a matter of course, the processes are ITIL-based, well-documented and historicized. The ITIL V3 certified Matrix42 Service Desk is completely integrated with the Service Catalog and related processes. The ticket automatically includes all information from contract, asset and license management to allow the service staff to make fast decisions and take efficient action. Introducion: 43zsec discovered some security flaws in the matrix42 service desk. Vulnerable Versions / Tested Versions: Service Store 5.3 SP3 (5.33.946.0) Patches: no Patches available for this vulnerability for today. Description: Impact: XSS URL: https://SERVERNAME/SPS/Portal/default.aspx?'"--></style></script> <script>alert(document.cookie)</script> Parameter Name: Query Based Parameter Type: FullQuery String Pattern: '"--></style></script><script>alert(document.cookie)</script> Remarks: Details: Source: https://www.owasp.org/index.php/Cross-site_Scripting_%28XSS%29 Cross-Site Scripting attacks are a type of injection problem, in which malicious scripts are injected into the otherwise benign and trusted web sites. Cross-site scripting (XSS) attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user. Flaws that allow these attacks to succeed are quite widespread and occur anywhere a web application uses input from a user in the output it generates without validating or encoding it. An attacker can use XSS to send a malicious script to an unsuspecting user. The end user&#8217;s browser has no way to know that the script should not be trusted, and will execute the script. Because it thinks the script came from a trusted source, the malicious script can access any cookies, session tokens, or other sensitive information retained by your browser and used with that site. These scripts can even rewrite the content of the HTML page. Impact: XSS gives a attacker a lot of attacking vectors, including: Session Hijacking: stealing the user session cookie Phishing Attacks MITM Attacks: Intercepting data. REMEDY: Microsoft Anti-Cross Site Scripting Library V4.2 http://www.microsoft.com/en-us/download/details.aspx?id=28589 XSS (Cross Site Scripting) Prevention Cheat Sheet https://www.owasp.org/index.php/XSS_%28Cross_Site_Scripting%29_Prevention_Cheat_Sheet Time-Map: 06.03.2013 Vendor contacted 10.04.2013 Vendor will Patch this issue 18.04.2013 disclosure References: http://www.matrix42.de http://www.asseco.com/ https://www.owasp.org/index.php/Cross-site_Scripting_%28XSS%29 http://www.microsoft.com/en-us/download/details.aspx?id=28589 ************************************************************************************

Referencje:

http://www.matrix42.de
http://www.asseco.com/
https://www.owasp.org/index.php/Cross-site_Scripting_%28XSS%29
http://www.microsoft.com/en-us/download/details.aspx?id=28589


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top