CiscoSecure ACS setup.exe action Variable XSS

2002-07-14T23:14:07
ID OSVDB:5049
Type osvdb
Reporter Dave Palumbo(dpalumbo@yahoo.com)
Modified 2002-07-14T23:14:07

Description

Vulnerability Description

Cisco Secure ACS contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate 'action' variables upon submission to 'setup.exe' handler. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution Description

Upgrade to version 3.1 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

Cisco Secure ACS contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate 'action' variables upon submission to 'setup.exe' handler. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Manual Testing Notes

http://[victim]:dyn_port/setup.exe?action=>alert('foo+bar')</script>&page=list_users&user=P*

This exploit is only effective when the target ACS administrator is logged into the application

References:

Vendor URL: http://www.cisco.com/ ISS X-Force ID: 9353 CVE-2002-0938 Bugtraq ID: 5026