lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <020701c86fdb$311b68e0$29b4fea9@INFIGO03>
Date: Fri, 15 Feb 2008 15:00:58 +0100
From: "infocus" <infocus@...igo.hr>
To: <bugtraq@...urityfocus.com>
Cc: full-disclosure@...ts.grok.org.uk
Subject: [INFIGO-2008-02-13]: SOPHOS Email Security
	Appliance Cross Site Scripting Vulnerability

                                           
            INFIGO IS Security Advisory #ADV-2008-02-13
                                http://www.infigo.hr/en/




Title: SOPHOS Email Security Appliance Cross Site Scripting Vulnerability
Advisory ID: INFIGO-2008-02-13
Date: 2008-02-13
Advisory URL: http://www.infigo.hr/en/in_focus/advisories/INFIGO-2008-02-13
Impact: Malicious JavaScript Code Injection
Risk Level: Medium
Vulnerability Type: Remote




==[ Overview

Sophos ES1000 Email Security Appliance delivers protection against spam,
viruses, Trojans, spyware and other malware. Sophos's award-winning
anti-virus engine detects all types of malware in a single, high-speed 
scan. Every Sophos appliance is updated with new protection intelligence 
every 5 minutes.



==[ Vulnerability

During an audit of Sophos ES1000 Email Security Appliance, a Cross Site 
Scripting vulnerability was discovered in its web administration interface.
Administration web interface is available on the public network interface,
over HTTPS on port 18080.

Lack of input validation for 'error' and 'go' parameters of the 'Login'
script, allows malicious JavaScript code injection.

https://192.168.0.10:18080/Login?logout=0&error=<INJECTION>&go=<INJECTION>

This can be exploited by a malicious user to steal Sophos ES1000 Email 
Security Appliance administrator credentials, and shut down the appliance,
or change its configuration.



==[ Affected Version

The vulnerability has been identified in the latest available Sophos
ES1000 and ES4000 Email Security appliances. 



==[ Fix

This vulnerability has been fixed in Sophos Email Appliance version 2.1.1.0
and above, available automatically to Sophos' customers between 14-21
February 2008. More information at
http://www.sophos.com/support/knowledgebase/article/34733.html



==[ PoC Exploit

Not needed.



==[ Vendor status

28.01.2008 - Initial contact, automated response
04.02.2008 - Repeated contact
06.02.2008 - Vendor response
07.02.2008 - Vendor status update
08.02.2008 - Vendor status update
13.02.2008 - Vendor status update
14.02.2008 - fix available
15.02.2008 - Coordinated public disclosure



==[ Credits

Vulnerability discovered by Leon Juranic <leon.juranic@...igo.hr>.



==[ INFIGO IS Security Contact

INFIGO IS,

WWW : http://www.infigo.hr/en/
E-mail : infocus@...igo.hr

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ