ciscobbsm-xss.txt

2008-05-13T00:00:00
ID PACKETSTORM:66315
Type packetstorm
Reporter Brad Antoniewicz
Modified 2008-05-13T00:00:00

Description

                                        
                                            `Title: Cisco BBSM Captive Portal Cross-site Scripting  
-------------------------------------------------------------  
Vendor: Cisco Systems  
Vendor URL: www.cisco.com  
Vendor Response: Vendor has been notified and has since addressed the issue in the latest software release.  
  
Description:  
A non-persistent XSS vulnerability is present within the AccessCodeStart.asp page. A   
malicious user may leverage this to possibly gain access client information in captive   
portal/hotspot locations using this software.   
  
Example:  
  
http://host/ekgnkm/AccessCodeStart.asp?msg=%3Cscript%3Ealert(%22XSS%22);%3C/script%3E  
  
Patch Information:  
  
Patch URL -   
http://tools.cisco.com/support/downloads/go/ImageList.x?relVer=5.3&mdfid=278455427&sftType=Building%20Broadband%20Service%20Manager%20(BBSM)%20Updates&optPlat=&nodecount=2&edesignator=null&modelName=Cisco%20Building%20Broadband%20Service%20Manager%205.3&treeMdfId=281527126&treeName=Network%20Monitoring%20and%20Management  
  
Download BBSMPatch5332.zip  
  
CVE: CVE-2008-2165  
  
Credit:  
  
Brad Antoniewicz  
brad.antoniewicz@foundstone.com  
`