exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

netegrityXSS.txt

netegrityXSS.txt
Posted Jul 1, 2004
Authored by HexView

A cross site scripting vulnerability exists in Netegrity IdentityMinder Web Edition 5.6 SP2 for Windows and Netegrity Policy Server version 5.5.

tags | advisory, web, xss
systems | windows
SHA-256 | 60d8395a6691d3d4f0676d76c918575f97a8d986d0e069c2a2e903bd448fa6ff

netegrityXSS.txt

Change Mirror Download
Cross-Site Scripting (XSS) Vulnerability in Netegrity IdentityMinder

Classification:
===============
Level: low-[MED]-high-crit
ID: HEXVIEW*2004*07*02*1

Overview:
=========
IdentityMinder is an identity and role management product developed by
Netegrity (http://www.netegrity.com), a microsoft gold-certified
identity and access management partner. Both primary and management web
interfaces are vulnerable to classic cross-site scripting (XSS) attacks.

Affected products:
==================
All tests were performed using Netegrity IdentityMinder Web Edition 5.6 SP2
for Windows, IIS Server, and Netegrity Policy Server V5.5. Possibly all other
IdentityMinder releases are vulnerable.

Cause and Effect:
=================
Although IdentityMinder product employs URL filtering capabilities that
disallow using common XSS characters in the URL, it is possible to
submit the URL string containing any character using zero-byte string
poisoning method. The part of the URL after %00 character is not checked
against XSS characters. Management interface is also vulnerable to XSS
and does not even require zero-byte poisoning.
The vulnerability makes possible to execute scripts in the context of webpage
with current IdentityMinder user privileges. It can be used to steal page data,
and/or to perform ItentityMinder tasks with the privileges of logged-in user.

Demonstration:
==============
The problem can be reproduced by entering following the link below (split over
several lines for readability). The example link is form action link from
ViewGroup search dialog. Please note that you need to replace PUT_*_HERE's
with your actual variables.

http://PUT_ADDRESS_HERE/idm/PUT_SITE_NAME_HERE/ims_mainconsole_principalpopuphandler.do?
searchAttrs0=%25GROUP_NAME%25&searchOperators0=EQUALS&searchFilter0=
&searchOrgDN=PUT_DN_HERE&incChildrenOrgFlag=NO&resultsPerPage=10&oid=
&imsui_taskstate=RESOLVE_SCOPE&imsui_tpnametosearch=group
&numOfExpressions=1%00<script>alert(document.cookie)</script>

Here is another link demonstrating the problem in IdentityMinder management
interface. Note that %00 poisoning is not required.

http://PUT_ADDRESS_HERE:7001/idmmanage/mobjattr.do?diroid=PUT_OID_HERE
&attrname=Group%20Members&mobjtype=2<script>alert(document.cookie)</script>

Feedback and comments:
======================
Feedback and questions about this disclosure are welcome at vuln@hexview.com
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    0 Files
  • 9
    Nov 9th
    0 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close