[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

CodeMeter WebAdmin Cross-site Scripting (XSS) Vulnerability



Vulnerability title: CodeMeter WebAdmin Cross-site Scripting (XSS) Vulnerability

CVSS Risk Rating: 3.9 (Low)

Product: CodeMeter WebAdmin

Application Vendor: Wibu-Systems

Vendor URL: http://www.codemeter.de

Public disclosure date: 5/30/2011

Discovered by: Rob Kraus and the Solutionary Engineering Research Team (SERT)

Solutionary ID: SERT-VDN-1007

Solutionary public disclosure URL: http://www.solutionary.com/index/SERT/Vuln-Disclosures/CodeMeter-WebAdmin.html

Vulnerability Description: The applications web interface contains an injection point, which allows for execution of Cross-site Scripting (XSS) attacks. Arbitrary client side code such as JavaScript can be included into certain parameters throughout the web application. The hardware dongle must be inserted in order to reproduce the vulnerability. The following parameters and web pages have been tested and verified; however, it is possible additional views and parameters within the application may be vulnerable: 

Reflected XSS 
Licenses.html (BoxSerial parameter)

Affected software versions: WebAdmin version 3.30 and 4.30 (previous versions may also be vulnerable)

Impact: Successful attacks could disclose sensitive information about the user, session, and application to the attacker, resulting in a loss of confidentiality. Using XSS, an attacker could  insert malicious code into a web page and entice naïve users to execute the malicious code.

Fixed in: Pending - The vendor has logged the issue and anticipates a patch to be available in Autumn 2011.

Remediation guidelines: Restrict access to internal network segments and monitor vendor notifications for application updates that may address and fix the issues identified. Remove the hardware dongle from the affected system when not needed.