124 lines
No EOL
4 KiB
Text
124 lines
No EOL
4 KiB
Text
Permanent XSS:
|
||
|
||
Advisory Name: Permanent Cross-Site Scripting (XSS) in Hipergate 4.0.12
|
||
|
||
Vulnerability Class: Permanent Cross-Site Scripting (XSS)
|
||
|
||
Release Date: 2010-02-02
|
||
|
||
Affected Applications: Confirmed in Hipergate 4.0.12. Other versions may also be affected
|
||
|
||
Affected Platforms: Multiple
|
||
|
||
Local / Remote: Remote
|
||
|
||
Severity: Medium – CVSS: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
|
||
|
||
Researcher: Nahuel Grisolía
|
||
|
||
Vendor Status: Still Vulnerable – No Patch Available at the moment
|
||
|
||
Vulnerability Description:
|
||
A permanent Cross Site Scripting vulnerability was found in Hipergate 4.0.12, because the application
|
||
fails to sanitize user-supplied input. Any logged-in user who is able to add a New Campaign can trigger
|
||
the vulnerability.
|
||
|
||
Proof of Concept:
|
||
* Add <script>alert(“XSS in Campaign”);</script> as a new campaign.
|
||
|
||
Impact:
|
||
|
||
An affected user may unintentionally execute scripts or actions written by an attacker. In addition, an
|
||
attacker may obtain authorization cookies that would allow him to gain unauthorized access to the
|
||
application.
|
||
Solution: Maybe in Build 5.5 (Future Release, information provided by the vendor)
|
||
Vendor Response: Last Contact on January 12, 2010. They said that no more patches would be
|
||
provided since Build 5.5 will be released soon.
|
||
Contact Information:
|
||
For more information regarding the vulnerability feel free to contact the researcher at
|
||
nahuel.grisolia <at> gmail <dot> com
|
||
|
||
Reflected XSS:
|
||
|
||
Advisory Name: Reflected Cross-Site Scripting (XSS) in Hipergate
|
||
|
||
Vulnerability Class: Reflected Cross-Site Scripting (XSS)
|
||
|
||
Release Date: 2010-02-02
|
||
|
||
Affected Applications: Confirmed in Hipergate 4.0.12. Other versions may also be affected
|
||
|
||
Affected Platforms: Multiple
|
||
|
||
Local / Remote: Remote
|
||
|
||
Severity: Medium – CVSS: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
|
||
|
||
Researcher: Nahuel Grisolía
|
||
|
||
Vendor Status: Still Vulnerable – No Patch Available at the moment
|
||
|
||
Vulnerability Description:
|
||
|
||
A reflected Cross Site Scripting vulnerability was found in Hipergate 4.0.12, because the application
|
||
fails to sanitize user-supplied input. Any logged-in user can trigger the vulnerability.
|
||
|
||
Proof of Concept:
|
||
|
||
http://x.x.x.x:8080/hipergate/common/errmsg.jsp?title=%3Cscript%3Ealert%28%22titleXSS%22%29;
|
||
%3C/script%3E&desc=%3Cscript%3Ealert%28%22descXSS%22%29;%3C/script%3E&resume=_bac
|
||
k
|
||
Script pwd_errmsg.jsp is also affected.
|
||
|
||
Impact:
|
||
|
||
An affected user may unintentionally execute scripts or actions written by an attacker. In addition, an
|
||
attacker may obtain authorization cookies that would allow him to gain unauthorized access to the
|
||
application.
|
||
Solution: Maybe in Build 5.5 (Future Release, information provided by the vendor)
|
||
Vendor Response: Last Contact on January 12, 2010. They said that no more patches would be
|
||
provided since Build 5.5 will be released soon.
|
||
Contact Information:
|
||
For more information regarding the vulnerability feel free to contact the researcher at
|
||
nahuel.grisolia <at> gmail <dot> com
|
||
|
||
SQL Command Exec:
|
||
|
||
Advisory Name: SQL Command Exec in Hipergate
|
||
|
||
Vulnerability Class: SQL Command Exec
|
||
|
||
Release Date: 2010-02-02
|
||
|
||
Affected Applications: Confirmed in Hipergate 4.0.12. Other versions may also be affected.
|
||
|
||
Affected Platforms: Multiple
|
||
|
||
Local / Remote: Remote
|
||
|
||
Severity: High – CVSS: 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
|
||
|
||
Researcher: Nahuel Grisolía
|
||
|
||
Vendor Status: Still Vulnerable – No Patch Available at the moment
|
||
|
||
Vulnerability Description:
|
||
A vulnerability has been discovered in Hipergate, which can be exploited by malicious people to
|
||
conduct SQL Command Execution Attacks.
|
||
The vulnerability is confirmed in version 4.0.12. Other versions may also be affected.
|
||
|
||
Proof of Concept:
|
||
|
||
http://x.x.x.x:8080/hipergate/admin/sql.htm
|
||
|
||
Impact: Execute arbitrary SQL queries.
|
||
|
||
Solution: Maybe in Build 5.5 (Future Release, information provided by the vendor)
|
||
|
||
Vendor Response: Last Contact on January 12, 2010. They said that no more patches would be
|
||
provided since Build 5.5 will be released soon.
|
||
|
||
Contact Information:
|
||
|
||
For more information regarding the vulnerability feel free to contact the researcher at
|
||
nahuel.grisolia <at> gmail <dot> com |