Lucene search

K
certCERTVU:311644
HistoryApr 15, 2013 - 12:00 a.m.

pd-admin contains cross-site scripting vulnerabilities

2013-04-1500:00:00
www.kb.cert.org
17

CVSS2

3.5

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

EPSS

0.001

Percentile

33.3%

Overview

pd-admin, a web interface for users of hosting providers, is susceptible to cross-site scripting (XSS) vulnerabilities.

Description

CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)

pd-admin, contains cross-site scripting (XSS) vulnerabilities.

The vulnerability report provided by Thomas Roth states:

Reflective cross-site scripting
When pasting the string below into the ‘Create new directory’ textfield (found under ‘WebFTP’ -> ‘Overview’), the error page will include the attacker supplied JavaScript code.

_"><script>alert("XSS");</script>_

Stored cross-site scripting
When storing the string below as the body for an e-mail autoresponder, every time someone tries to change the text of the autoresponder, the attacker supplied JavaScript code will execute. By tricking a (higher privileged) support contact into looking at it, the attacker might be able to steal the support contact’s session cookie.

_</textarea><script>alert("XSS");</script>_


Impact

An attacker may be able to exploit the cross-site scripting vulnerability to result in information leakage, privilege escalation, and/or denial of service on the host computer.


Solution

Apply an Update

pd-admin 4.17 has been released to address these vulnerabilities.


Restrict access

As a general good security practice, only allow connections from trusted hosts and networks. Note that restricting access does not prevent XSS attacks since the attack comes as an HTTP request from a legitimate user’s host. Restricting access would prevent an attacker from accessing the web interface using stolen credentials from a blocked network location.


Vendor Information

311644

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

pd-admin Affected

Notified: March 20, 2013 Updated: April 15, 2013

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

CVSS Metrics

Group Score Vector
Base 4.3 AV:N/AC:M/Au:N/C:N/I:P/A:N
Temporal 3.9 E:ND/RL:U/RC:UC
Environmental 2.9 CDP:ND/TD:M/CR:ND/IR:ND/AR:ND

References

Acknowledgements

Thanks to Thomas Roth for reporting this vulnerability.

This document was written by Jared Allar.

Other Information

CVE IDs: CVE-2013-0129
Date Public: 2013-03-08 Date First Published:

CVSS2

3.5

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

EPSS

0.001

Percentile

33.3%

Related for VU:311644