what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Enterasys SecureStack Switch 6.x Cross Site Scripting

Enterasys SecureStack Switch 6.x Cross Site Scripting
Posted Mar 8, 2012
Authored by Julien Ahrens, Vulnerability Laboratory | Site vulnerability-lab.com

Enterasys SecureStack Switch version 6.x suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 780aef06e36039bb7d2830730651f06018461ad1dfda9c5cdd589170a78ff75f

Enterasys SecureStack Switch 6.x Cross Site Scripting

Change Mirror Download
Title:
======
Enterasys SecureStack Switch v6.x - Multiple Vulnerabilities


Date:
=====
2012-03-08


References:
===========
http://www.vulnerability-lab.com/get_content.php?id=443


VL-ID:
=====
443


Introduction:
=============
The Enterasys C5 is a scalable, high-performance Gigabit Ethernet switch offering support for IEEE 802.3at
compliant high-power PoE, flexible 10 Gigabit Ethernet options, dynamic IPv4 and IPv6 routing and enhanced
automation capabilities to provide for a future-proofed solution that significantly reduces operational
expenses for customers. Along with a switch capacity of 264 Gbps, the C5 provides up to 48 10/100/1000
Ethernet ports as well as two SFP+ ports, with the ability to support both 1GE and 10GE uplinks on the same
port. Leveraging the C5’s stacking capability, as many as 8 C5s (both 24-port and 48-port combinations) can
be interconnected in a single stack to create a virtual switch that provides 2.11 Tbps of capacity and up to
384 10/100/1000 Ethernet ports as well as 16 10GE uplink ports. All C-Series products include a comprehensive
lifetime warranty that includes services for which many competitors charge additional fees. Included benefits,
such as advanced hardware return, firmware feature upgrades (which most vendors cover at most for 90 days)
and telephone support (which most don’t include or severely limit) combine to significantly decrease operational costs
for organizations – equaling savings of up to $1 million in service contract fees over the life of a customer’s network.

(Copy of the Vendor Homepage: http://www.enterasys.com/products/security-enabled-infrastructure/securestack-cseries.aspx )


Abstract:
=========
A Vulnerability Laboratory Researcher discovered multiple Web Vulnerabilities on Enterasys SecureStack Switch v6.x.


Report-Timeline:
================
2012-02-16: Vendor Notification
2012-**-**: Vendor Response/Feedback
2012-**-**: Vendor Fix/Patch
2012-03-08: Public or Non-Public Disclosure


Status:
========
Published


Affected Products:
==================
Enterasys
Product: SecureStack Switch v6.x


Exploitation-Technique:
=======================
Remote


Severity:
=========
High


Details:
========
Multiple persistent Input Validation vulnerabilities are detected on Enterasys SecureStack Switches Series A - C.
Local low privileged user accounts can implement/inject malicious script code to manipulate modules via persistent context
requests. When exploited by an authenticated user, the identified vulnerabilities can result in information disclosure via error,
session hijacking, access to available appliance services, manipulated persistent content execution out of the application context.

Vulnerable Module(s):
[+] System Name
[+] System Location
[+] System Contact
[+] VLAN Name

Affected Model(s):
[+] B2G124-24 - Firmware: 04.02.08.0006
[+] B2G124-48 - Firmware: 04.02.08.0006
[+] B3G124-48 - Firmware: 04.02.08.0006
[+] B5G124-24 - Firmware: 06.41.02.0007
[+] B5G124-48 - Firmware: 06.41.05.0001, 06.41.06.0002, 06.42.08.0007
[+] C3G124-24P - Firmware: 06.03.08.0012, 06.42.10.0016 (latest)
[+] C3G124-48 - Firmware: 06.03.04.0004
[+] C3G124-48P - Firmware: 06.03.08.0012

Picture(s):
../1.png
../2.png
../3.png
../4.png
../5.png
../6.png


Proof of Concept:
=================
The vulnerabilities can be exploited by remote attackers with low required user inter action. For demonstration or reproduce ...

Exploitation via Console:
Command#1: set vlan name 1337 <script>alert(document.cookie)</script>
Command#2: set system name <iframe src=http://www.vulnerability-lab.com>
Command#3: set system location "><iframe src=a onload=alert("VL") <
Command#4: set system contact <script>alert('VL')</script>

Note: To exploit the bug via webinterface, see pictures section.


Risk:
=====
The security risk of the persistent Input Validation Vulnerabilities is estimated as high(-).


Credits:
========
Vulnerability Laboratory Researcher - Julien Ahrens (MrTuxracer) [www.inshell.net]



Disclaimer:
===========
The information provided in this advisory is provided as it is without any warranty. Vulnerability-Lab disclaims all warranties,
either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-
Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business
profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some
states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation
may not apply. Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability-
Lab. Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of
other media, are reserved by Vulnerability-Lab or its suppliers.

Copyright © 2012|Vulnerability-Lab




--
Website: www.vulnerability-lab.com ; vuln-lab.com or vuln-db.com
Contact: admin@vulnerability-lab.com or support@vulnerability-lab.com

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close