{CVE-ID request} - OCS-Inventory-NG Multiple Stored Cross Site S

看板Bugtraq作者時間11年前 (2014/07/08 02:01), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串1/1
# Title: Multiple Stored Cross Site Scripting Vulnerabilities # Author: Madhu Akula # Vendor Homepage: http://www.ocsinventory-ng.org/en/ # Software Link: http://www.ocsinventory-ng.org/en/download/ # Tested on: Chrome=2C Mozilla Reporter Name : Madhu Akula Product : OCS-Inventory NG Version : All Versions Modules : OCS Reports Web Interface Tested On : Windows=2C Linux=2C Mac Browsers : Firefox=2C Chrome=2C IE and all other also Priority : High Severity: Critical Status : New Summary : Multiple Stored Cross Site Scripting Vulnerabilities leads to take over the User accounts & Internal Network scanning and some advanced attacks Description : About Vulnerability : Stored attacks are those where the injected script is permanently stored on the target servers=2C such as in a database=2C in a message forum=2C visitor log=2C comment field=2C etc. The victim then retrieves the maliciou= s script from the server when it requests the stored information. Impact : Attackers can execute scripts in a victim=92s browser to hijack user sessions=2C deface web sites=2C insert hostile content=2C redirect users=2C hijack the user=92s browser using malware=2C etc. For more reference : https://www.owasp.org/index.php/Top_10_2013-A3-Cross-Site_Scripting_(XSS) Conclusion : By using this vulnerability attackers use some frame works like Beef=2C OWASP xenotix to exploit the victim browsers and he can able to install key loggers and some other malicious activities also and it's very high sever and affected to all fields and versions. Steps to Reproduce : (POC) I created a clear poc and the link is here=2C https://www.dropbox.com/s/7bbdv8o8q1faotk/ocsng_sxsss.ogv Mitigation : Fixed release in SVN References : http://packetstormsecurity.com/files/127295/OCS-Inventory-NG-Cross-Site-Scr= ipting.html http://cxsecurity.com/issue/WLB-2014070004 http://www.securityfocus.com/bid/68292 http://irist.ir/exploits-1663.html Credit : Madhu Akula Information Security Researcher https://www.twitter.com/madhuakula
文章代碼(AID): #1Jkk1Vvp (Bugtraq)