lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAOmMdVsYK4ubHhVV=TdqVo6STEZbvQ3drsqjUNNMtpSchUy2AQ@mail.gmail.com>
Date: Wed, 12 Mar 2014 13:55:36 -0300
From: William Costa <william.costa@...il.com>
To: "full-disclosure@...ts.grok.org.uk" <full-disclosure@...ts.grok.org.uk>
Subject: Multiplus XSS in Proxmox Mail Gateway 3.1
	(CVE-2014-2325)

I. VULNERABILITY

-------------------------

Multiplus XSS in Proxmox Mail Gateway 3.1



II. BACKGROUND

-------------------------

Proxmox Mail Gateway helps you protect your business against all email
threats like spam, viruses, phishing and trojans at the moment they
emerge. The flexible architecture combined with the userfriendly,



III. DESCRIPTION

-------------------------

Has been detected a XSS Reflected via GET and Store XSS via POST
vulnerability in Promox Mail Gateway in
"/objects/who/index.htm?state=" parameter "state" and input User
(E-mail address) in /quarantine/spam/manage.htm that allows the
execution of arbitrary HTML/script code to be executed in the context
of the victim user's browser and/or Session Hijacking attack





IV. PROOF OF CONCEPT

-------------------------

 The application does not validate the parameter filter in
https://IP/objects/who/index.htm?itemid=1&gid=2&state=
'>aaaaa<script>alert(document.cookie)</script>







V. BUSINESS IMPACT

-------------------------



That allows the execution attackers tohijack the authentication of
administrators.



VI. REQUIREMENTS

-----------------------

An Attacker needs to know the IP of the device.

An Administrator needs an authenticated connection to the device.



VII. SYSTEMS AFFECTED

-------------------------

Try Proxmox Mail Gateway 3.1



VIII. SOLUTION

-------------------------

All parameter must be validated.

Fix
http://proxmox.com/news/archive/view/listid-1-proxmox-newsletter/mailid-48-proxmox-newsletter-march-2014-proxmox-ve-3-2-released/tmpl-component

By William Costa

Content of type "text/html" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ