[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAAnZqX8az6do-Uv=5o793CL0QZnji0-7KCBZ71OPO85BS6yaOQ@mail.gmail.com>
Date: Wed, 18 Oct 2017 08:48:32 +0300
From: Maor Shwartz <maors@...ondsecurity.com>
To: fulldisclosure@...lists.org
Cc: SecuriTeam Secure Disclosure <ssd@...ondsecurity.com>
Subject: [FD] SSD Advisory – HPE Baseline Smart Gig SFP 24 Switch Pre-authentication Stored XSS
SSD Advisory – HPE Baseline Smart Gig SFP 24 Switch Pre-authentication
Stored XSS
Full report: https://blogs.securiteam.com/index.php/archives/3389
Twitter: @SecuriTeam_SSD
Weibo: SecuriTeam_SSD
Vulnerability Summary
The following advisory describes an unauthenticated stored XSS in the HPE
Baseline Smart Gig SFP 24 / 3Com Baseline Switch 2924 SFP Plus Switch.
The vulnerability affect versions:
Software Version: 01.00.10
Boot version: 1.0.0.14
Hardware Version: 01.01.0a
“On April 12, 2010, Hewlett-Packard completed the acquisition of 3Com.
Since the acquisition, 3Com has been fully absorbed by Hewlett-Packard and
no longer exists as a separate entity.”
Every 3Com model changed its identification number. The new HP name/ID
number for this switch is “HP Baseline Smart Gig SFP 24 – JE002A”
There is no other difference between 3CBLSG24 and JE002A.
Credit
An independent security researcher has reported this vulnerability to
Beyond Security’s SecuriTeam Secure Disclosure program
Vendor response
HPE was informed of the vulnerability, their response was: “This issue is
not going to be resolved. We had hoped resources could be found to address
the issue, but the business determined that the product is out of support
life. It’s been this way for several years. We hoped we could communicate
something to customers about the product, but this switch is truly not
supported in that way either.”
--
Thanks
Maor Shwartz
Beyond Security
GPG Key ID: 93CC36E2DE7FF514
Download attachment "SSD Advisory – HPE Baseline Smart Gig SFP 24 Switch Pre-authentication Stored XSS – SecuriTeam Blogs.pdf" of type "application/pdf" (103663 bytes)
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists