exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

INFIGO-2008-02-13.txt

INFIGO-2008-02-13.txt
Posted Feb 15, 2008
Authored by Leon Juranic | Site infigo.hr

The SOPHOS ES1000 and ES4000 Email Security Appliances suffer from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 123b619e25aff04e8e4059347592ab523fc7b2fc5ae0e69d4e85093667da700d

INFIGO-2008-02-13.txt

Change Mirror Download
                                           
INFIGO IS Security Advisory #ADV-2008-02-13
https://www.infigo.hr/en/




Title: SOPHOS Email Security Appliance Cross Site Scripting Vulnerability
Advisory ID: INFIGO-2008-02-13
Date: 2008-02-13
Advisory URL: https://www.infigo.hr/en/in_focus/advisories/INFIGO-2008-02-13
Impact: Malicious JavaScript Code Injection
Risk Level: Medium
Vulnerability Type: Remote




==[ Overview

Sophos ES1000 Email Security Appliance delivers protection against spam,
viruses, Trojans, spyware and other malware. Sophos's award-winning
anti-virus engine detects all types of malware in a single, high-speed
scan. Every Sophos appliance is updated with new protection intelligence
every 5 minutes.



==[ Vulnerability

During an audit of Sophos ES1000 Email Security Appliance, a Cross Site
Scripting vulnerability was discovered in its web administration interface.
Administration web interface is available on the public network interface,
over HTTPS on port 18080.

Lack of input validation for 'error' and 'go' parameters of the 'Login'
script, allows malicious JavaScript code injection.

https://192.168.0.10:18080/Login?logout=0&error=<INJECTION>&go=<INJECTION>

This can be exploited by a malicious user to steal Sophos ES1000 Email
Security Appliance administrator credentials, and shut down the appliance,
or change its configuration.



==[ Affected Version

The vulnerability has been identified in the latest available Sophos
ES1000 and ES4000 Email Security appliances.



==[ Fix

This vulnerability has been fixed in Sophos Email Appliance version 2.1.1.0
and above, available automatically to Sophos' customers between 14-21
February 2008. More information at
https://www.sophos.com/support/knowledgebase/article/34733.html



==[ PoC Exploit

Not needed.



==[ Vendor status

28.01.2008 - Initial contact, automated response
04.02.2008 - Repeated contact
06.02.2008 - Vendor response
07.02.2008 - Vendor status update
08.02.2008 - Vendor status update
13.02.2008 - Vendor status update
14.02.2008 - fix available
15.02.2008 - Coordinated public disclosure



==[ Credits

Vulnerability discovered by Leon Juranic <leon.juranic@infigo.hr>.



==[ INFIGO IS Security Contact

INFIGO IS,

WWW : https://www.infigo.hr/en/
E-mail : infocus@infigo.hr
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close