what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 25979

Secunia Security Advisory 25979
Posted Jul 17, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Alex Hernandez has reported some vulnerabilities in Proventia GX5108 and GX5008, which potentially can be exploited by malicious people to conduct cross-site scripting attacks and compromise a vulnerable system.

tags | advisory, vulnerability, xss
SHA-256 | 1c826133f1ef12ac5d4bc75cf77e166b44a1c469f743df7afca1774b1c01ec09

Secunia Security Advisory 25979

Change Mirror Download


----------------------------------------------------------------------

Try a new way to discover vulnerabilities that ALREADY EXIST in your
IT infrastructure.

The Full Featured Secunia Network Software Inspector (NSI) is now
available:
http://secunia.com/network_software_inspector/

The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT
vulnerabilities in more than 4,000 different Windows applications.

----------------------------------------------------------------------

TITLE:
Proventia GX5108 and GX5008 Cross-Site Scripting and File Inclusion

SECUNIA ADVISORY ID:
SA25979

VERIFY ADVISORY:
http://secunia.com/advisories/25979/

CRITICAL:
Less critical

IMPACT:
System access

WHERE:
>From remote

OPERATING SYSTEM:
ISS Proventia G/GX Series
http://secunia.com/product/2348/

DESCRIPTION:
Alex Hernandez has reported some vulnerabilities in Proventia GX5108
and GX5008, which potentially can be exploited by malicious people to
conduct cross-site scripting attacks and compromise a vulnerable
system.

1) Input passed to the "reminder" parameter in alert.php is not
properly sanitised before being returned to the administrator. This
can be exploited to execute arbitrary HTML and script code in an
administrator's browser session in context of the web interface.

2) Input passed to the "page" parameter in main.php is not properly
used before being used to include files. This can be exploited to
include arbitrary files from local or remote resources.

Successful exploitation requires valid authentication, but may be
exploited by tricking a logged-in administrator to follow a specially
crafted link.

Note: It is also reported that the used OpenSSH version is vulnerable
to a timing attack which may allow attackers to identify valid user
names.

The vulnerabilities are reported in Proventia GX5108 with firmware
version 1.3 (2006-06-05) and Proventia GX5008 1.5 (2007-06-14). Other
versions may also be affected.

SOLUTION:
Do not browse other sites while being logged in to the administrator
interface.

PROVIDED AND/OR DISCOVERED BY:
Alex Hernandez, Sybsecurity

ORIGINAL ADVISORY:
http://www.sybsecurity.com/hack-proventia-1.pdf

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close