Hipergate 4.0.12 – Multiple Vulnerabilities

  • 作者: Nahuel Grisolia
    日期: 2010-02-03
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/11324/
  • Permanent XSS:
    
    Advisory Name: Permanent Cross-Site Scripting (XSS) in Hipergate 4.0.12
    
    Vulnerability Class: Permanent Cross-Site Scripting (XSS)
    
    Release Date: 2010-02-02
    
    Affected Applications: Confirmed in Hipergate 4.0.12. Other versions may also be affected
    
    Affected Platforms: Multiple
    
    Local / Remote: Remote
    
    Severity: Medium – CVSS: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
    
    Researcher: Nahuel Grisolía
    
    Vendor Status: Still Vulnerable – No Patch Available at the moment
    
    Vulnerability Description:
    A permanent Cross Site Scripting vulnerability was found in Hipergate 4.0.12, because the application
    fails to sanitize user-supplied input. Any logged-in user who is able to add a New Campaign can trigger
    the vulnerability.
    
    Proof of Concept:
    * Add <script>alert(“XSS in Campaign”);</script> as a new campaign.
    
    Impact:
    
    An affected user may unintentionally execute scripts or actions written by an attacker. In addition, an
    attacker may obtain authorization cookies that would allow him to gain unauthorized access to the
    application.
    Solution: Maybe in Build 5.5 (Future Release, information provided by the vendor)
    Vendor Response: Last Contact on January 12, 2010. They said that no more patches would be
    provided since Build 5.5 will be released soon.
    Contact Information:
    For more information regarding the vulnerability feel free to contact the researcher at
    nahuel.grisolia <at> gmail <dot> com
    
    Reflected XSS:
    
    Advisory Name: Reflected Cross-Site Scripting (XSS) in Hipergate
    
    Vulnerability Class: Reflected Cross-Site Scripting (XSS)
    
    Release Date: 2010-02-02
    
    Affected Applications: Confirmed in Hipergate 4.0.12. Other versions may also be affected
    
    Affected Platforms: Multiple
    
    Local / Remote: Remote
    
    Severity: Medium – CVSS: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
    
    Researcher: Nahuel Grisolía
    
    Vendor Status: Still Vulnerable – No Patch Available at the moment
    
    Vulnerability Description:
    
    A reflected Cross Site Scripting vulnerability was found in Hipergate 4.0.12, because the application
    fails to sanitize user-supplied input. Any logged-in user can trigger the vulnerability.
    
    Proof of Concept:
    
    http://x.x.x.x:8080/hipergate/common/errmsg.jsp?title=%3Cscript%3Ealert%28%22titleXSS%22%29;
    %3C/script%3E&desc=%3Cscript%3Ealert%28%22descXSS%22%29;%3C/script%3E&resume=_bac
    k
    Script pwd_errmsg.jsp is also affected.
    
    Impact:
    
    An affected user may unintentionally execute scripts or actions written by an attacker. In addition, an
    attacker may obtain authorization cookies that would allow him to gain unauthorized access to the
    application.
    Solution: Maybe in Build 5.5 (Future Release, information provided by the vendor)
    Vendor Response: Last Contact on January 12, 2010. They said that no more patches would be
    provided since Build 5.5 will be released soon.
    Contact Information:
    For more information regarding the vulnerability feel free to contact the researcher at
    nahuel.grisolia <at> gmail <dot> com
    
    SQL Command Exec:
    
    Advisory Name: SQL Command Exec in Hipergate
    
    Vulnerability Class: SQL Command Exec
    
    Release Date: 2010-02-02
    
    Affected Applications: Confirmed in Hipergate 4.0.12. Other versions may also be affected.
    
    Affected Platforms: Multiple
    
    Local / Remote: Remote
    
    Severity: High – CVSS: 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
    
    Researcher: Nahuel Grisolía
    
    Vendor Status: Still Vulnerable – No Patch Available at the moment
    
    Vulnerability Description:
    A vulnerability has been discovered in Hipergate, which can be exploited by malicious people to
    conduct SQL Command Execution Attacks.
    The vulnerability is confirmed in version 4.0.12. Other versions may also be affected.
    
    Proof of Concept:
    
    http://x.x.x.x:8080/hipergate/admin/sql.htm
    
    Impact: Execute arbitrary SQL queries.
    
    Solution: Maybe in Build 5.5 (Future Release, information provided by the vendor)
    
    Vendor Response: Last Contact on January 12, 2010. They said that no more patches would be
    provided since Build 5.5 will be released soon.
    
    Contact Information:
    
    For more information regarding the vulnerability feel free to contact the researcher at
    nahuel.grisolia <at> gmail <dot> com