lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: 31 May 2011 22:19:49 -0000
From: robkraus@...utionary.com
To: bugtraq@...urityfocus.com
Subject: CodeMeter WebAdmin Cross-site Scripting (XSS) Vulnerability

Vulnerability title: CodeMeter WebAdmin Cross-site Scripting (XSS) Vulnerability

CVSS Risk Rating: 3.9 (Low)

Product: CodeMeter WebAdmin

Application Vendor: Wibu-Systems

Vendor URL: http://www.codemeter.de

Public disclosure date: 5/30/2011

Discovered by: Rob Kraus and the Solutionary Engineering Research Team (SERT)

Solutionary ID: SERT-VDN-1007

Solutionary public disclosure URL: http://www.solutionary.com/index/SERT/Vuln-Disclosures/CodeMeter-WebAdmin.html

Vulnerability Description: The applications web interface contains an injection point, which allows for execution of Cross-site Scripting (XSS) attacks. Arbitrary client side code such as JavaScript can be included into certain parameters throughout the web application. The hardware dongle must be inserted in order to reproduce the vulnerability. The following parameters and web pages have been tested and verified; however, it is possible additional views and parameters within the application may be vulnerable: 

Reflected XSS 
Licenses.html (BoxSerial parameter)

Affected software versions: WebAdmin version 3.30 and 4.30 (previous versions may also be vulnerable)

Impact: Successful attacks could disclose sensitive information about the user, session, and application to the attacker, resulting in a loss of confidentiality. Using XSS, an attacker could  insert malicious code into a web page and entice naïve users to execute the malicious code.

Fixed in: Pending - The vendor has logged the issue and anticipates a patch to be available in Autumn 2011.

Remediation guidelines: Restrict access to internal network segments and monitor vendor notifications for application updates that may address and fix the issues identified. Remove the hardware dongle from the affected system when not needed.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ