lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Sat, 12 Dec 2015 22:01:07 +0530
From: Aravind <altoarun@...il.com>
To: fulldisclosure@...lists.org, cert@...t.org, bugs@...uritytracker.com,
  submissions@...ketstormsecurity.org, bugtraq@...urityfocus.com
Subject: XSS Vulnerability in Synnefo Client for Synnefo IMS 2015 - CVE-2015-8247

Information
=================================
#Vulnerability type: Cross Site Scripting (XSS)
#Vendor: http://www.synnefoims.com/
#Product: Synnefo Client for Synnefo Internet Management Software
(IMS) 2015 (http://www.synnefoims.com/products.html)


CVE Reference:
=================================
CVE-2015-8247


Technical Details:
=================================
A reflected cross site scripting (XSS) vulnerability was found in synnefoclient
for Synnefo IMS 2015. The vulnerability has been discovered in the plan_name
parameter on the request to fetch the package details for the logged in user.
Request method is GET.


Vulnerable Parameter
=================================
plan_name


Sample Payload with URL
=================================
http://<domain_name>/synnefoclient/packagehistory/listusagesdata?active_plan=1&uname=<username>&st_date=2015-10-01+08%3A39%3A32&end_date=2015-10-31+23%3A59%3A59&plan_name=<script>alert(‘xss’);</script>


Exploitation Technique:
==================================
Remote


Severity Level:
==================================
High


Timeline
=================================
-Vendor notified - Tue, 27 Oct 2015 11:32:21 +0530

-Vendor responded and acknowledged - Tue, 27 Oct 2015 12:27:50 +0530


Credits & Authors
===================================
Aravind C Ajayan

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ