what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

MobileIron 4.5.4 Cross Site Scripting

MobileIron 4.5.4 Cross Site Scripting
Posted Oct 28, 2013
Authored by Marc Ruef, Pascal Schaufelberger

MobileIron version 4.5.4 suffers from a cross site scripting vulnerability in the device registration functionality.

tags | exploit, xss
SHA-256 | 0086a60987e5725b61729a566ad575d52c9d7f81ffe6150d619bb1da469fb747

MobileIron 4.5.4 Cross Site Scripting

Change Mirror Download
MobileIron 4.5.4 Device Registration regpin Cross Site Scripting

scip AG Vulnerability ID 10847 (10/28/2013)
http://www.scip.ch/en/?vuldb.10847

I. INTRODUCTION

MobileIron is a commercial solution to provide secure access to mobile users in corporate environments.

More information is available on the official web site at the following URL:

http://www.mobileiron.com/

II. DESCRIPTION

Pascal Schaufelberger at scip AG found a cross site scripting vulnerability in the older release 4.5.4.

An attacker is able to inject arbitrary script code without former authentication.

III. SCORING

CVSSv2 Base Score: 7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSSv2 Temp Score: 5.9 (CVSS2#E:POC/RL:OF/RC:C)

IV. EXPLOITATION

The attack requires access to the device registration form. The attack attempt can be initiated with the following url:

https://www.example.com/mifs/c/i/reg/reg.html?regpin=12345"><script>alert('scip')</script>

V. IMPACT

This is a traditional reflected cross site scripting vulnerability, which allows the injection of arbitrary script code. An attacker might be able to alter the behavior of the web site and might therefore attack visitors.

VI. DETECTION

Cross site scripting pattern in the regpin field should be detected and eliminated. Most security solutions provide this function out of the box.

VII. SOLUTION

This issue got fixed in release 5.1.0 without further notification. Current release is 5.8, which has been available since October 2013.

VIII. VENDOR RESPONSE

The issue has been reported to the vendor via email. The communication was very efficient and friendly.

After exchange of technical details the vendor informed that this issue was known already and has been patched without further notice.

IX. SOURCES

scip AG - Security is our Business
http://www.scip.ch

scip AG - Vulnerability Database
http://www.scip.ch/en/?vuldb.10847

X. DISCLOSURE TIMELINE

2013/09/28 Identification of the vulnerability
2013/10/14 First contact to MobileIron via Twitter
2013/10/15 Got mail address of MobileIron security contact
2013/10/16 Initial confirmation of our submission by MobileIron
2013/10/18 Detailed description of further actions by MobileIron
2013/10/18 Confirmation of next steps by scip AG
2013/10/28 Public disclosure of the advisory

XI. CREDITS

The vulnerability has been discovered by Pascal Schaufelberger.

Pascal Schaufelberger, scip AG, Zuerich, Switzerland
pasc-at-scip.ch
http://www.scip.ch

The disclosure process has been handled by Marc Ruef.

Marc Ruef, scip AG, Zuerich, Switzerland
maru-at-scip.ch
http://www.scip.ch

A1. LEGAL NOTICES

Copyright (c) 2002-2013 scip AG, Switzerland.

Permission is granted for the re-distribution of this alert. It may not
be edited in any way without permission of scip AG.

The information in the advisory is believed to be accurate at the time
of publishing based on currently available information. There are no
warranties with regard to this information. Neither the author nor the
publisher accepts any liability for any direct, indirect or
consequential loss or damage from use of or reliance on this advisory.
Login or Register to add favorites

File Archive:

December 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    2 Files
  • 2
    Dec 2nd
    12 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    14 Files
  • 6
    Dec 6th
    18 Files
  • 7
    Dec 7th
    11 Files
  • 8
    Dec 8th
    36 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close