Secunia Security Advisory - Alex Hernandez has reported some vulnerabilities in Proventia GX5108 and GX5008, which potentially can be exploited by malicious people to conduct cross-site scripting attacks and compromise a vulnerable system.
1c826133f1ef12ac5d4bc75cf77e166b44a1c469f743df7afca1774b1c01ec09
----------------------------------------------------------------------
Try a new way to discover vulnerabilities that ALREADY EXIST in your
IT infrastructure.
The Full Featured Secunia Network Software Inspector (NSI) is now
available:
http://secunia.com/network_software_inspector/
The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT
vulnerabilities in more than 4,000 different Windows applications.
----------------------------------------------------------------------
TITLE:
Proventia GX5108 and GX5008 Cross-Site Scripting and File Inclusion
SECUNIA ADVISORY ID:
SA25979
VERIFY ADVISORY:
http://secunia.com/advisories/25979/
CRITICAL:
Less critical
IMPACT:
System access
WHERE:
>From remote
OPERATING SYSTEM:
ISS Proventia G/GX Series
http://secunia.com/product/2348/
DESCRIPTION:
Alex Hernandez has reported some vulnerabilities in Proventia GX5108
and GX5008, which potentially can be exploited by malicious people to
conduct cross-site scripting attacks and compromise a vulnerable
system.
1) Input passed to the "reminder" parameter in alert.php is not
properly sanitised before being returned to the administrator. This
can be exploited to execute arbitrary HTML and script code in an
administrator's browser session in context of the web interface.
2) Input passed to the "page" parameter in main.php is not properly
used before being used to include files. This can be exploited to
include arbitrary files from local or remote resources.
Successful exploitation requires valid authentication, but may be
exploited by tricking a logged-in administrator to follow a specially
crafted link.
Note: It is also reported that the used OpenSSH version is vulnerable
to a timing attack which may allow attackers to identify valid user
names.
The vulnerabilities are reported in Proventia GX5108 with firmware
version 1.3 (2006-06-05) and Proventia GX5008 1.5 (2007-06-14). Other
versions may also be affected.
SOLUTION:
Do not browse other sites while being logged in to the administrator
interface.
PROVIDED AND/OR DISCOVERED BY:
Alex Hernandez, Sybsecurity
ORIGINAL ADVISORY:
http://www.sybsecurity.com/hack-proventia-1.pdf
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------