Alienvault OSSIM/USM 5.3.1 Cross Site Scripting

2016-11-02T00:00:00
ID PACKETSTORM:139485
Type packetstorm
Reporter Peter Lapp
Modified 2016-11-02T00:00:00

Description

                                        
                                            `Details  
=======  
  
Product: Alienvault OSSIM/USM  
Vulnerability: Reflected XSS  
Author: Peter Lapp, lappsec () gmail com  
CVE: CVE-2016-8583  
Vulnerable Versions: <=5.3.1  
Fixed Version: 5.3.2  
  
  
  
Vulnerability Details  
=====================  
  
Multiple GET parameters in the vulnerability scan scheduler of  
OSSIM/USM before 5.3.2 are vulnerable to reflected XSS. The parameters  
include jobname, timeout, sched_id, and targets[] in  
/ossim/vulnmeter/sched.php.  
  
  
  
POC  
===  
  
Example payload is: "><body+onpageshow%3d"alert(0)  
For the targets[] param the payload is slightly different.  
  
  
  
Timeline  
========  
  
08/03/16 - Reported to Vendor  
10/03/16 - Fixed in version 5.3.2  
  
  
  
References  
==========  
  
https://www.alienvault.com/forums/discussion/7766/security-advisory-alienvault-5-3-2-address-70-vulnerabilities  
  
  
`