Title: ====== Dell PacketTrap PSA 7.1 - Multiple Persistent Vulnerabilities Date: ===== 2013-07-18 References: =========== http://www.vulnerability-lab.com/get_content.php?id=790 VL-ID: ===== 790 Common Vulnerability Scoring System: ==================================== 5.6 Introduction: ============= Purpose built for IT professionals and other service businesses. Streamline the management of projects, clients, staff, assets, and billing. Software should be intuitive and easy-to-use, not complicated and confusing. That`s why packetTrap has created an easy to use yet powerful interface that even your techs enjoy using. Whether you are using spreadsheets and sticky notes or clunky software, companies like yours will surely benefit from the significant time savings and a dramatic increase in profitability. With packetTrap PSA, you now have an integrated solution that delivers an end-to-end business management solution with real advantages over other options. Service Request Tracking - Team Scheduling - Customer and Contact Management - Customer Portal - Mobile Friendly - QuickBooks Integration Equipment Tracking Contract Management - Email Dropbox - SSL Security. (Copy of the Vendor Homepage: http://www.packettrap.com/ ) Abstract: ========= The Vulnerability Laboratory Research Team discovered multiple persistent web vulnerabilities in the DELL packetTrap PSA v7.1 web application. Report-Timeline: ================ 2013-01-24: Researcher Notification & Coordination (Ibrahim Mosaad El-Sayed) 2013-02-06: Vendor Notification (Dell Security Team) 2013-02-08: Vendor Response/Feedback (Dell Security Team) 2013-**-**: Vendor Fix/Patch (Developer Team) 2013-07-18: Public Disclosure (Vulnerability Laboratory) Status: ======== Published Affected Products: ================== DELL Product: PacketTrap PSA 7.1 Exploitation-Technique: ======================= Remote Severity: ========= High Details: ======== Multiple persistent input validation vulnerabilities are detected in the DELL packetTrap PSA v7.1 web application. The bug allows remote attackers to implement/inject own malicious script code on the application side of the system (persistent). Exploitation of persistent issues mostly requires a low privilege application user account and an user interaction click or input. The 1st persistent web vulnerability is located in the contracts module when processing to request a via POST method manipulated txtContractName parameter. The vulnerability allows remote attackers to inject own malicious script code with persistent vector in a vulnerable value which is also in use by the contract module when processing to display (list) the context (output). The result is the persistent execution of script code in the contract overview listing. The 2nd persistent web vulnerability is located in the Equipment Item module when processing to request a via POST method manipulated lblPurchaseInfo parameter. The vulnerability allows remote attackers to inject own malicious script code with persistent vector in a vulnerable value which is also in use by the Equipment Item module when processing to display (list) the context (output). The result is the persistent execution of script code in the Equipment Item listing. The 3rd persistent web vulnerability is located in the Import Customer Equipment Records module when processing to request a via POST method manipulated gridItem parameter. The vulnerability allows remote attackers to inject own malicious script code with persistent vector in a vulnerable value which is also in use by the Import Customer Equipment Records module when processing to display (list) the context (output). The result is the persistent execution of script code in the Import Customer Equipment Records listing. The 4th part of the persistent web vulnerabilities are located in the Labor Rate module when processing to request via POST method manipulated lblItemNo, lblDescription, lblAccountName & lblNotes parameters. The vulnerabilities allow remote attackers to inject own malicious script code with persistent vector in a vulnerable value which is also in use by the Labor Rate module when processing to display (list) the context (output). The result is the persistent execution of script code in the Labor Rate listing. The 5th part of the persistent web vulnerabilities are located in the Materials Item module when processing to request via POST method manipulated lblMfrName, lblMfrItemNo, lblMfrDescription, lblAccountName & lblNotes parameters. The vulnerabilities allow remote attackers to inject own malicious script code with persistent vector in a vulnerable value which is also in use by the Materials Item module when processing to display (list) the context (output). The result is the persistent execution of script code in the Materials Item listing. The 6th part of the persistent web vulnerabilities are located in the New customer module when processing to request via POST method manipulated lblPrimaryContact & lblPrimaryLocation parameters. The vulnerabilities allow remote attackers to inject own malicious script code with persistent vector in a vulnerable value which is also in use by the New customer module when processing to display (list) the context (output). The result is the persistent execution of script code in the New customer listing. The 7th persistent web vulnerability is located in the Report module when processing to request a via POST method manipulated lblPageTitle parameter. The vulnerability allows remote attackers to inject own malicious script code with persistent vector in a vulnerable value which is also in use by the Report module when processing to display (list) the context (output). The result is the persistent execution of script code in the Report overview listing. Exploitation of the vulnerability requires a low privilege web-application user account and low or medium user interaction. Successful exploitation of the vulnerability results in session hijacking (manager/admin) with persistent vector, persistent phishing, persistent external redirects to malware, exploits or scripts and persistent manipulation of module context. Vulnerable Module(s): [+] Contract - PacketTrap PSA [+] Equipment Item - PacketTrap PSA [+] Import Customer Equipment Records - PacketTrap PSA [+] Labor Rate - PacketTrap PSA [+] Materials Item - PacketTrap PSA [+] New customer - PacketTrap PSA [+] Report x ApplicationName - PacketTrap PSA Vulnerable Parameter(s): [+] txtContractName [+] lblPurchaseInfo [+] gridItem [+] lblItemNo, lblDescription, lblAccountName & lblNotes [+] lblMfrName, lblMfrItemNo, lblMfrDescription, lblAccountName & lblNotes [+] lblPrimaryContact & lblPrimaryLocation [+] lblPageTitle Affected Section(s): [+] Contract Overview & Edit - Listing [+] Equipment Item Overview & Edit - Listing [+] Import Customer Equipment Records Overview - Listing [+] Labor Rate Details - Listing [+] Materials Item Overview - Listing [+] New customer Account Details - Listing [+] Report - Listing Proof of Concept: ================= The persistent script code inject vulnerabilities can be exploited by low privileged group user accounts with low required user interaction. For demonstration or reproduce ... Review: Contract Overview & Edit - Listing

Contract: "><[PERSISTENT INJECTED SCRIPT CODE!]>

Sample Customer

... & Contract Name: "><[PERSISTENT INJECTED SCRIPT CODE!]> Review: Equipment Item Overview & Edit - Listing Purchase Info.: Purchased on Dec 11, 2012 from "><[PERSISTENT INJECTED SCRIPT CODE!]> Review: Import Customer Equipment Records Overview - Listing phpinfo(); O_O ?> ><[PERSISTENT INJECTED SCRIPT CODE!]( Review: Labor Rate Details - Listing Name/No.: "><[PERSISTENT INJECTED SCRIPT CODE!]> Description: "><[PERSISTENT INJECTED SCRIPT CODE!]> ... & Account Name: "><[PERSISTENT INJECTED SCRIPT CODE!]> Review: Materials Item Overview - Listing "><[PERSISTENT INJECTED SCRIPT CODE!]"> Description: "><[PERSISTENT INJECTED SCRIPT CODE!]> ... & ... & Review: New customer Account Details - Listing

Manufacturer: "><[PERSISTENT INJECTED SCRIPT CODE!]>
Mfr. Item No.: "><[PERSISTENT INJECTED SCRIPT CODE!]>
Mfr. Item Desc.: "><[PERSISTENT INJECTED SCRIPT CODE!]>
Account Name: "><[PERSISTENT INJECTED SCRIPT CODE!]>

Id: 33583304
Created: by the storm on Dec 9, 2012 at 5:11 PM

Notes: "><[PERSISTENT INJECTED SCRIPT CODE!]>
Primary Contact: ">