what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Java System Solutions SSO Plugin For BMC MyIT 4.0.13.1 Cross Site Scripting

Java System Solutions SSO Plugin For BMC MyIT 4.0.13.1 Cross Site Scripting
Posted Aug 20, 2018
Authored by Marco Murch

Java System Solutions SSO plugin for BMC MyIT version 4.0.13.1 suffers from a cross site scripting vulnerability.

tags | exploit, java, xss
advisories | CVE-2018-15528
SHA-256 | dc1139a3e435f0009cc81e57d55e45a0ccf9ecb5879c567ef9b84bbdb53292c6

Java System Solutions SSO Plugin For BMC MyIT 4.0.13.1 Cross Site Scripting

Change Mirror Download
Title:
======

Reflected XSS in Java System Solutions SSO Plugin 4.0.13.1 for BMC MyIT

Description:
============

Reflected Cross-Site Scripting in Java System Solutions' BMC MyIT SSO Plugin version 4.0.13.1 was identified during a penetration test. Other versions might be affected as well. A remote attacker can abuse this issue to inject client-side scripts into the "select_sso()" function. The payload is triggered when the victim opens a prepared link and hits the "Login" button.

Proof-of-concept:
=================

Open https://<hostname>/ux/jss-sso/arslogin?javascript:alert(%27Deloitte%20XSS%20PoC%27) and hit the "Login" button.

Affected function:
==================

function select_sso() {
console.log('SSO login');
id('loginForm').action= 'javascript:alert(%27Deloitte%20XSS%20PoC%27)';
id('username').name= 'username';
id('password').name= 'password';

usingsso(true);

Solution:
=========

Contact vendor for fix.

Disclosure Timeline:
====================

2018-07-17: Vulnerability discovered
2018-07-17: Vulnerability reported to manufacturer
2018-07-17: Response from manufacturer that vulnerability is known and has been fixed, but refused to provide any details
2018-08-09: Requested CVE ID from MITRE; CVE-2018-15528 was reserved
2018-08-20: Public disclosure of vulnerability & notification to manufacturer

Credits:
========

This security vulnerability was found by Marco Murch of Deloitte GmbH.

E-Mail: mamu[DELETE_ME_:-)]rch[at]deloitte[dot]de
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close