CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:S/C:N/I:P/A:N
EPSS
Percentile
33.3%
pd-admin, a web interface for users of hosting providers, is susceptible to cross-site scripting (XSS) vulnerabilities.
CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)
pd-admin, contains cross-site scripting (XSS) vulnerabilities.
The vulnerability report provided by Thomas Roth states:
Reflective cross-site scripting
When pasting the string below into the ‘Create new directory’ textfield (found under ‘WebFTP’ -> ‘Overview’), the error page will include the attacker supplied JavaScript code.
_"><script>alert("XSS");</script>_
Stored cross-site scripting
When storing the string below as the body for an e-mail autoresponder, every time someone tries to change the text of the autoresponder, the attacker supplied JavaScript code will execute. By tricking a (higher privileged) support contact into looking at it, the attacker might be able to steal the support contact’s session cookie.
_</textarea><script>alert("XSS");</script>_
An attacker may be able to exploit the cross-site scripting vulnerability to result in information leakage, privilege escalation, and/or denial of service on the host computer.
Apply an Update
pd-admin 4.17 has been released to address these vulnerabilities.
Restrict access
As a general good security practice, only allow connections from trusted hosts and networks. Note that restricting access does not prevent XSS attacks since the attack comes as an HTTP request from a legitimate user’s host. Restricting access would prevent an attacker from accessing the web interface using stolen credentials from a blocked network location.
311644
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Notified: March 20, 2013 Updated: April 15, 2013
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Group | Score | Vector |
---|---|---|
Base | 4.3 | AV:N/AC:M/Au:N/C:N/I:P/A:N |
Temporal | 3.9 | E:ND/RL:U/RC:UC |
Environmental | 2.9 | CDP:ND/TD:M/CR:ND/IR:ND/AR:ND |
Thanks to Thomas Roth for reporting this vulnerability.
This document was written by Jared Allar.
CVE IDs: | CVE-2013-0129 |
---|---|
Date Public: | 2013-03-08 Date First Published: |