lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <201808200803.w7K83qGY024924@ip-100-122-153-233.us-east-1.ec2.aws.symcpe.net>
Date: Mon, 20 Aug 2018 08:03:52 GMT
From: mamurch@...oitte.de
To: bugtraq@...urityfocus.com
Subject: [CVE-2018-15528] Reflected XSS in Java System Solutions SSO
 Plugin 4.0.13.1 for BMC MyIT

Title:
======

Reflected XSS in Java System Solutions SSO Plugin 4.0.13.1 for BMC MyIT

Description:
============

Reflected Cross-Site Scripting in Java System Solutions' BMC MyIT SSO Plugin version 4.0.13.1 was identified during a penetration test. Other versions might be affected as well. A remote attacker can abuse this issue to inject client-side scripts into the "select_sso()" function. The payload is triggered when the victim opens a prepared link and hits the "Login" button.

Proof-of-concept:
=================

Open https://<hostname>/ux/jss-sso/arslogin?javascript:alert(%27Deloitte%20XSS%20PoC%27) and hit the "Login" button.

Affected function:
==================

  function select_sso() {  
    console.log('SSO login');
    id('loginForm').action= 'javascript:alert(%27Deloitte%20XSS%20PoC%27)';
    id('username').name= 'username';
    id('password').name= 'password';

    usingsso(true);

Solution:
=========

Contact vendor for fix.

Disclosure Timeline:
====================

2018-07-17: Vulnerability discovered
2018-07-17: Vulnerability reported to manufacturer
2018-07-17: Response from manufacturer that vulnerability is known and has been fixed, but refused to provide any details
2018-08-09: Requested CVE ID from MITRE; CVE-2018-15528 was reserved
2018-08-20: Public disclosure of vulnerability & notification to manufacturer

Credits:
========

This security vulnerability was found by Marco Murch of Deloitte GmbH.

E-Mail: mamu[DELETE_ME_:-)]rch[at]deloitte[dot]de

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ