lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20071115214759.10717.qmail@securityfocus.com>
Date: 15 Nov 2007 21:47:59 -0000
From: research@...checkup.com
To: bugtraq@...urityfocus.com
Subject: PR07-26: Persistent XSS on Aruba 800 Mobility Controller's login page

Date Found: 17th July 2007

Vendor informed: 23rd July 2007

Confirmed by vendor: 13th September 2007

Description:

Aruba 800 is vulnerable to a persistent XSS on the administrator login screen.

An unauthenticated user can re-write the hidden parameter 'url' by requesting a link under the /screens/ directory:

https://internalip:4343/screens/%22/%3E%3Cscript%3Ealert(1)%3C/script%3E

The payload stays intact until another user makes a request under the /screens/ directory, prior to logging in.

Consequences:

An attacker may be able to cause execution of malicious scripting code in the browser of an admin user. Such code would run within the security context of the target domain.

This type of attack can result in a persistent defacement of the target site, or the redirection of confidential information (i.e.: admin session IDs, passwords) to unauthorised third parties.

Since this XSS is of persistent nature, the admin user wouldn't have to be tricked to visit a specially-crafted URL, but rather simply visit the Aruba 800 login page at some point.

Severity: High

Author: Jan Fry [jan.fry [at] procheckup.com] of ProCheckUp Ltd (www.procheckup.com)

References:

http://www.arubanetworks.com/products/mobility-controllers/aruba-800.php

http://arubanetworks.com/support/alerts/aid-070907b.asc

Note: the vulnerability was originally documented by Aruba Networks but no information was provided regarding the exploitation of this XSS vulnerability in a persistent way. Aruba Networks has now updated their 'AID-070907b' advisory to include additional information.

ProCheckUp thanks Aruba Networks for working with us.

Solution: update the firmware to version 2.5.4.25.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ