lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Mon, 7 Jul 2014 16:23:00 +0530
From: Madhu Akula <madhu.akula@...mail.com>
To: "bugtraq@...urityfocus.com" <bugtraq@...urityfocus.com>
Subject: {CVE-ID request} - OCS-Inventory-NG Multiple Stored Cross Site Scripting
 Vulnerabilities.



# Title: Multiple Stored Cross Site Scripting Vulnerabilities
# Author: Madhu Akula
# Vendor Homepage: http://www.ocsinventory-ng.org/en/
# Software Link: http://www.ocsinventory-ng.org/en/download/
# Tested on: Chrome, Mozilla



Reporter Name : Madhu Akula

Product : OCS-Inventory NG

Version : All Versions

Modules : OCS Reports Web Interface

Tested On : Windows, Linux, Mac

Browsers : Firefox, Chrome, IE and all other also

Priority : High

Severity: Critical

Status : New

Summary : Multiple Stored Cross Site Scripting Vulnerabilities leads to
take over the User accounts & Internal Network scanning and some
advanced attacks

Description :

About Vulnerability :

Stored attacks are those where the injected script is permanently stored
on the target servers, such as in a database, in a message forum,
visitor log, comment field, etc. The victim then retrieves the malicious
script from the server when it requests the stored information.

Impact :

Attackers can execute scripts in a victim’s browser to hijack user
sessions, deface web sites, insert hostile content, redirect users,
hijack the user’s browser using malware, etc.

For more reference :

https://www.owasp.org/index.php/Top_10_2013-A3-Cross-Site_Scripting_(XSS)

Conclusion :

By using this vulnerability attackers use some frame works like Beef,
OWASP xenotix to exploit the victim browsers and he can able to install
key loggers and some other malicious activities also and it's very high
sever and affected to all fields and versions.

Steps to Reproduce : (POC)

I created a clear poc and the link is here,

https://www.dropbox.com/s/7bbdv8o8q1faotk/ocsng_sxsss.ogv

Mitigation :

Fixed release in SVN


References :

http://packetstormsecurity.com/files/127295/OCS-Inventory-NG-Cross-Site-Scripting.html
http://cxsecurity.com/issue/WLB-2014070004
http://www.securityfocus.com/bid/68292
http://irist.ir/exploits-1663.html

Credit :
Madhu Akula
Information Security Researcher
https://www.twitter.com/madhuakula



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ