SOPHOS Email Security Appliance Cross Site Scripting Vulnerability

2008.02.20
Credit: Leon Juranic
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79


CVSS Base Score: 4.3/10
Impact Subscore: 2.9/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

INFIGO IS Security Advisory #ADV-2008-02-13 http://www.infigo.hr/en/ Title: SOPHOS Email Security Appliance Cross Site Scripting Vulnerability Advisory ID: INFIGO-2008-02-13 Date: 2008-02-13 Advisory URL: http://www.infigo.hr/en/in_focus/advisories/INFIGO-2008-02-13 Impact: Malicious JavaScript Code Injection Risk Level: Medium Vulnerability Type: Remote ==[ Overview Sophos ES1000 Email Security Appliance delivers protection against spam, viruses, Trojans, spyware and other malware. Sophos's award-winning anti-virus engine detects all types of malware in a single, high-speed scan. Every Sophos appliance is updated with new protection intelligence every 5 minutes. ==[ Vulnerability During an audit of Sophos ES1000 Email Security Appliance, a Cross Site Scripting vulnerability was discovered in its web administration interface. Administration web interface is available on the public network interface, over HTTPS on port 18080. Lack of input validation for 'error' and 'go' parameters of the 'Login' script, allows malicious JavaScript code injection. https://192.168.0.10:18080/Login?logout=0&error=<INJECTION>&go=<INJECTIO N> This can be exploited by a malicious user to steal Sophos ES1000 Email Security Appliance administrator credentials, and shut down the appliance, or change its configuration. ==[ Affected Version The vulnerability has been identified in the latest available Sophos ES1000 and ES4000 Email Security appliances. ==[ Fix This vulnerability has been fixed in Sophos Email Appliance version 2.1.1.0 and above, available automatically to Sophos' customers between 14-21 February 2008. More information at http://www.sophos.com/support/knowledgebase/article/34733.html ==[ PoC Exploit Not needed. ==[ Vendor status 28.01.2008 - Initial contact, automated response 04.02.2008 - Repeated contact 06.02.2008 - Vendor response 07.02.2008 - Vendor status update 08.02.2008 - Vendor status update 13.02.2008 - Vendor status update 14.02.2008 - fix available 15.02.2008 - Coordinated public disclosure ==[ Credits Vulnerability discovered by Leon Juranic <leon.juranic (at) infigo (dot) hr [email concealed]>. ==[ INFIGO IS Security Contact INFIGO IS, WWW : http://www.infigo.hr/en/ E-mail : infocus (at) infigo (dot) hr [email concealed]


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top