what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

ProCheckUp Security Advisory 2007.26

ProCheckUp Security Advisory 2007.26
Posted Nov 16, 2007
Authored by ProCheckUp, Jan Fry | Site procheckup.com

The Aruba 800 is vulnerable to a persistent cross site scripting vulnerability on the administrator login screen.

tags | exploit, xss
SHA-256 | 3e73dcdf74055dee74b222dec88feb100ce0260e700825e3d8fd7ec82381a1cf

ProCheckUp Security Advisory 2007.26

Change Mirror Download
Date Found: 17th July 2007

Vendor informed: 23rd July 2007

Confirmed by vendor: 13th September 2007

Description:

Aruba 800 is vulnerable to a persistent XSS on the administrator login screen.

An unauthenticated user can re-write the hidden parameter 'url' by requesting a link under the /screens/ directory:

https://internalip:4343/screens/%22/%3E%3Cscript%3Ealert(1)%3C/script%3E

The payload stays intact until another user makes a request under the /screens/ directory, prior to logging in.

Consequences:

An attacker may be able to cause execution of malicious scripting code in the browser of an admin user. Such code would run within the security context of the target domain.

This type of attack can result in a persistent defacement of the target site, or the redirection of confidential information (i.e.: admin session IDs, passwords) to unauthorised third parties.

Since this XSS is of persistent nature, the admin user wouldn't have to be tricked to visit a specially-crafted URL, but rather simply visit the Aruba 800 login page at some point.

Severity: High

Author: Jan Fry [jan.fry [at] procheckup.com] of ProCheckUp Ltd (www.procheckup.com)

References:

http://www.arubanetworks.com/products/mobility-controllers/aruba-800.php

http://arubanetworks.com/support/alerts/aid-070907b.asc

Note: the vulnerability was originally documented by Aruba Networks but no information was provided regarding the exploitation of this XSS vulnerability in a persistent way. Aruba Networks has now updated their 'AID-070907b' advisory to include additional information.

ProCheckUp thanks Aruba Networks for working with us.

Solution: update the firmware to version 2.5.4.25.
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close