Base Soundtouch 18.1.4 Cross Site Scripting

2019.01.08
Credit: Tim Schughart
Risk: Low
Local: No
Remote: Yes
CWE: CWE-80
CWE-79


CVSS Base Score: 4.3/10
Impact Subscore: 2.9/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

CWE-80 XSS Bose Soundtouch App Internal reference: - Vulnerability type: Cross-Site Scripting (CWE-80) Vulnerable version: 18.1.4 and maybe older versions, too (not tested) Vulnerable component: IOS Frontend of the application Report confidence: Unconfirmed Solution status: Could be fixed by vendor? Fixed version: - Vendor notification: 2018-06-21 Solution date: ? CVE reference: CVE-2018-12638 CVSSv3: Calculator: 4.3 AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N <https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/CR:X/IR:X/AR:X/MAV:N/MAC:X/MPR:N/MUI:R/MS:U/MC:H/MI:N/MA:N> Researcher Credits: Tim Schughart Vulnerability Details: The smartphone name isnat filtered properly and is reflected unfiltered to the app. This results in an cross site scritping, if you just connect to the Bose box via the app. Risk: Malicious javascript code can be executed within a users context. This can lead to session hijacking or triggering unwanted actions via the interface. Steps to reproduce: Just name your iOS device in a<script>alert(1)</script>a and pair your box with your smartphone via the app. Many popups will occur. Solution: You should filter the input (the name of connected device) An issue was discovered in the Bose Soundtouch app 18.1.4 for iOS. There is no frontend input validation of the device name. A malicious device name can execute JavaScript on the registered Bose User Account if a speaker has been connected to the app. History: 2018-07-17 Informed Vendor about the Security Issue 2019-01-02 No response from vendor 2019-01-02 Public release Best regards / Mit freundlichen GrA1/4Aen Chris Hein Penetrationtester -- ProSec GmbH Robert-Koch-StraAe 1-9 56751 Polch Website: https://www.prosec-networks.com E-Mail: c.hein@prosec-networks.com Phone: +49 (0)261 450 930 90 Sitz der Gesellschaft / company domiciled in: Polch Registergericht / registry court: Amtsgericht Koblenz, HRB 26457 GeschA$?ftsfA1/4hrer / chief executive: Tim Schughart USt-IdNr./ VAT ID: DE290654714 "This E-Mail communication may contain CONFIDENTIAL, PRIVILEGED and/or LEGALLY PROTECTED information and is intended only for the named recipient(s). Any unauthorized use, dissemination, copying or forwarding is strictly prohibited. If you are not the intended recipient and have received this email communication in error, please notify the sender immediately, delete it and destroy all copies of this E-Mail." "Diese E-Mail Mitteilung kann VERTRAULICHE, dem BERUFSGEHEIMNIS UNTERLIEGENDE und/oder RECHTLICH GESCHATZTE Informationen enthalten und ist ausschlieAlich fA1/4r den/die genannten Adressaten bestimmt. Jede unbefugte Nutzung, Weitergabe, VervielfA$?ltigung oder Versendung ist strengstens verboten. Sollten Sie nicht der angegebene Adressat sein und diese E-Mail Mitteilung irrtA1/4mlich erhalten haben, informieren Sie bitte sofort den Absender, lAPschen diese E-Mail und vernichten alle Kopien."


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top