U programskom paketu HP Network Node Manager i otkriveno je nekoliko ranjivosti koje mogu rezultirati udaljenim pokretanjem HTML i skriptnog koda.
Paket:
HP Network Node Manager i (NNMi) 9.x
Operacijski sustavi:
HP-UX 10.x, HP-UX 11.x
Problem:
neodgovarajuća provjera ulaznih podataka, XSS
Iskorištavanje:
udaljeno
Posljedica:
umetanje HTML i skriptnog koda
Rješenje:
zaobilazno rješenje (workaround)
Izvorni ID preporuke:
SA46941
Izvor:
Secunia
Problem:
XSS ranjivosti su posljedica nepravilne provjere parametara "node", "nodename" i "field".
Posljedica:
Udaljeni napadač može iskoristiti ranjivosti kako bi pokretao proizvoljni HTML i skriptni kod.
Rješenje:
Još nije izdana službena programska nadogradnja koja otklanja otkrivene ranjivosti. Kao zaobilazno rješenje preporuča se korištenje filtera koji pronalaze zlonamjerne znakove.
HP Network Node Manager i Multiple Cross-Site Scripting Vulnerabilities
Secunia Advisory SA46941
Release Date 2011-11-30
Criticality level Less criticalLess critical
Impact Cross Site Scripting
Where From remote
Authentication level Available in Customer Area
Report reliability Available in Customer Area
Solution Status Unpatched
Systems affected Available in Customer Area
Approve distribution Available in Customer Area
Remediation status Secunia VIM
Software:
HP Network Node Manager i (NNMi) 9.x
Secunia CVSS Score Available in Customer Area
CVE Reference(s) No CVE references.
Description
Multiple vulnerabilities have been discovered in HP Network Node Manager i, which can be exploited by malicious people to conduct cross-site scripting attacks.
1) Input passed to the "node" parameter in nnm/mibdiscover and "nodename" parameter in nnm/protected/configurationpoll.jsp, nnm/protected/ping.jsp, nnm/protected/statuspoll.jsp, and nnm/protected/traceroute.jsp is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
2) Input passed to the "field" POST parameter in nmm/validate (when "binderId" is set to "ConsoleBinder" and "operation" is set to "command") is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
The vulnerabilities are confirmed in version 9.10.000. Other versions may also be affected.
Solution
Filter malicious characters and character sequences using a proxy.
Provided and/or discovered by
0a29
Original Advisory
http://0a29.blogspot.com/2011/11/0a29-11-1-cross-site-scripting.html
Posljednje sigurnosne preporuke