exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Multi-Tech Systems Cross Site Scripting

Multi-Tech Systems Cross Site Scripting
Posted Jun 2, 2011
Authored by Nathan Power

Multi-Tech Systems MultiModem iSMS suffers from multiple cross site scripting vulnerabilities. MultiModem iSMS Web Management Interface versions 1.47 and below are affected.

tags | advisory, web, vulnerability, xss
SHA-256 | 857d2a189b2061187d191edcd0432fd735cd894adbea85bee5dfbb848ba0063c

Multi-Tech Systems Cross Site Scripting

Change Mirror Download
Multi-Tech Systems MultiModem iSMS Multiple XSS Vulnerabilities

—————————————————————————————————————————————————————-
1. Summary:

Multi-Tech Systems “MultiModem iSMS” appliance is affected by multiple XSS (cross-site scripting) vulnerabilities. The product was designed to give low bandwidth applications the ability to send information by reliable, affordable SMS text messages.

—————————————————————————————————————————————————————-
2. Description:

Attack #1
An attacker can inject XSS code into the web management interface at the login screen. The XSS code can be injected through the username field. The system will log failed login username attempts. When the administrator goes to view the logs through the web management interface, the XSS code will be executed. The logs can be located through the web management interface here:

Statistics / Logs / Log Traces / System Logs

Attack #2
An attacker can inject XSS code into the web management interface via SMS text message. When the administrator goes to view the logs through the web management interface, the XSS code will be executed. The logs can be located through the web management interface here:

SMS Services / Inbox

Below is a POC video demonstrating the attack:

http://www.securitypentest.com/2011/05/multi-tech-systems-xss-poc.html

—————————————————————————————————————————————————————-
3. Impact:

Potentially allow an attacker to compromise the device, access the victims iSMS account, the vicitim’s browser, and information leakage about an organization.

—————————————————————————————————————————————————————-
4. Affected Products:

MultiModem iSMS Web Management Interface version 1.47 and below
MultiModem iSMS SF100 appliance, other models may be vulnerable

—————————————————————————————————————————————————————-
5. Solution: Apply the latest supplied vendor patches.

—————————————————————————————————————————————————————-
6. Time Table:

04/25/2011 Reported Vulnerability to the Vendor
05/13/2011 Vendor Acknowledge Vulnerability
05/24/2011 Upgrade to version 1.47f

—————————————————————————————————————————————————————-
7. Credits:

Discovered by Nathan Power
www.securitypentest.com

—————————————————————————————————————————————————————-

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close