Twenty Year Anniversary

Matrix42 Service Store 5.3 SP3 Cross Site Scripting

Matrix42 Service Store 5.3 SP3 Cross Site Scripting
Posted Apr 18, 2013
Authored by 43zsec

Matrix42 Service Store version 5.3 SP3 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | ee74f7c404a62241af532991871cb108

Matrix42 Service Store 5.3 SP3 Cross Site Scripting

Change Mirror Download
************************************************************************************
*
*
* 43zsec SECURITY ADVISORY
*
*
*
*
*
************************************************************************************


_
_ CVE ID : CVE-2013-2504
_ Product: Service Store 5.3 SP3 (5.33.946.0)
_ Vendor: matrix42 - member of asseco group
_ Subject: Cross-site Scripting - XSS

_ Classification: PCI 2.0: 6.5.7
PCI 1.2: 6.5.1
OWASP: A2
CWE: 79
CAPEC: 19
WASC: 08


_ Risk: High
_ Effect: Remotely exploitable
_ Author: 43zsec (43zsec() gmail.com)
_ Date: March 6th 2013
_ Dork: inurl:/SPS/Logon/AuthLogon.aspx?ReturnUrl=



Productinformation:
-------------
Matrix42 Service Desk (description from the Webpage):
http://www.matrix42.com/products/it-service-management/service-desk/

A friendly, well-organized customer service is the flagship of every company.
As the IT department’s central point of contact, the helpdesk ensures
user productivity.
As a matter of course, the processes are ITIL-based, well-documented
and historicized.
The ITIL V3 certified Matrix42 Service Desk is completely integrated
with the Service Catalog
and related processes. The ticket automatically includes all
information from contract,
asset and license management to allow the service staff to make fast
decisions and take efficient action.


Introducion:
43zsec discovered some security flaws in the matrix42 service desk.


Vulnerable Versions / Tested Versions:
Service Store 5.3 SP3 (5.33.946.0)


Patches:
no Patches available for this vulnerability for today.


Description:
Impact: XSS
URL:
https://SERVERNAME/SPS/Portal/default.aspx?'"--></style></script><script>alert(document.cookie)</script>

Parameter Name: Query Based
Parameter Type: FullQuery String
Pattern:
'"--></style></script><script>alert(document.cookie)</script>
Remarks:


Details:
Source: https://www.owasp.org/index.php/Cross-site_Scripting_%28XSS%29
Cross-Site Scripting attacks are a type of injection problem, in which malicious
scripts are injected into the otherwise benign and trusted web sites.
Cross-site scripting
(XSS) attacks occur when an attacker uses a web application to send
malicious code,
generally in the form of a browser side script, to a different end
user. Flaws that allow
these attacks to succeed are quite widespread and occur anywhere a web
application uses
input from a user in the output it generates without validating or encoding it.

An attacker can use XSS to send a malicious script to an unsuspecting user.
The end user’s browser has no way to know that the script should not
be trusted, and will execute the script.
Because it thinks the script came from a trusted source, the malicious
script can access any cookies,
session tokens, or other sensitive information retained by your
browser and used with that site.
These scripts can even rewrite the content of the HTML page.


Impact:
XSS gives a attacker a lot of attacking vectors, including:
Session Hijacking: stealing the user session cookie
Phishing Attacks
MITM Attacks: Intercepting data.


REMEDY:
Microsoft Anti-Cross Site Scripting Library V4.2
http://www.microsoft.com/en-us/download/details.aspx?id=28589

XSS (Cross Site Scripting) Prevention Cheat Sheet
https://www.owasp.org/index.php/XSS_%28Cross_Site_Scripting%29_Prevention_Cheat_Sheet


Time-Map:
06.03.2013 Vendor contacted
10.04.2013 Vendor will Patch this issue
18.04.2013 disclosure


References:
http://www.matrix42.de
http://www.asseco.com/

https://www.owasp.org/index.php/Cross-site_Scripting_%28XSS%29
http://www.microsoft.com/en-us/download/details.aspx?id=28589

************************************************************************************

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

December 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    11 Files
  • 2
    Dec 2nd
    1 Files
  • 3
    Dec 3rd
    18 Files
  • 4
    Dec 4th
    40 Files
  • 5
    Dec 5th
    16 Files
  • 6
    Dec 6th
    50 Files
  • 7
    Dec 7th
    12 Files
  • 8
    Dec 8th
    1 Files
  • 9
    Dec 9th
    1 Files
  • 10
    Dec 10th
    15 Files
  • 11
    Dec 11th
    30 Files
  • 12
    Dec 12th
    25 Files
  • 13
    Dec 13th
    15 Files
  • 14
    Dec 14th
    14 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close