exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

netscreenXSS.txt

netscreenXSS.txt
Posted Mar 2, 2004
Authored by Mark Lachniet

Netscreen-SA 5000 services VPNs are susceptible to cross site scripting attacks.

tags | advisory, xss
SHA-256 | 1fa645ba5a0cd875ceb7d4f2efb1eda31be72b2cc6c1dde152d22f5642921514

netscreenXSS.txt

Change Mirror Download
TITLE:  03-02-04 XSS Bug in NetScreen-SA 5000 Series of SSL VPN
appliance

SUMMARY

Cross Site Scripting bug in the 'delhomepage.cgi' CGI binary in the
NetScreen-SA 5000 Series SSL VPN appliance.


DETAILS

There exists a cross-site scripting bug in 'row' parameter of the
'delhomepage.cgi' CGI binary. This bug was discovered on an appliance

known as an "A5030-Clustered pair" running firmware version 3.3 Patch
1
(build 4797). The vulnerability may exist in other versions. This
issue
may result in the theft of credentials such as session cookies, allow
hostile client-side scripts to run with unintended access privileges,
or
provide a means for a "phishing" attack. For more detailed
descriptions
of Cross Site Scripting and its implications, please refer to
whitepapers
such as:

http://www.cgisecurity.com/articles/xss-faq.shtml
http://www.spidynamics.com/whitepapers/SPIcross-sitescripting.pdf

The 'delhomepage.cgi' is accessible only by authenticated users.


WORKAROUND

Upgrade to the patched version of IVE software. Contact Netscreen
support
for details.


ORIGINATOR

The issue was discovered by Mark Lachniet of Analysts International
[lachniet -=at=- analysts.com] during a security analysis of the web
application interface of the device. Analysts International's
security
team provides a variety of security services and can be reached at
[SecurityServices -=at=- analysts.com].


MAINTAINER

The maintainer of the Netscreen IVE SSL VPN Appliance is the Netscreen
Corporation [http://www.netscreen.com]. The following information
about
security at Netscreen is taken from the Security Center web page at:

http://www.netscreen.com/services/security/index.jsp

"Please report any potential or real instances of a security
vulnerability
(with any NetScreen product or service) to the NetScreen Security
Alert
Team at security@netscreen.com . For immediate assistance, TAC isd
Available 24 hours a day by calling 1-877-NETSCREEN."

VENDOR RESPONSE

In the opinion of the author, the Netscreen corporation responded
quickly
and efficiently to this issue, and clearly takes the security of their

products seriously. Netscreen should be commended for their prompt
and
professional handling of the issue.

DATE OF CONTACT

2/6/2004 - Sent E-Mail to Sriram Ramachandran [SRamachandran -=at=-
netscreen.com] and received response. Immediately discussed

issue via. conference call. The bug was confirmed by the
Netscreen staff.


2/7/2004 - Draft advisory sent to Netscreen support staff

2/9/2004 - Ongoing dialog with Netscreen on issue

2/11/2004 - Ongoing dialog with Netscreen on issue

2/18/2004 - Ongoing dialog with Netscreen on issue

2/23/2004 - Ongoing dialog with Netscreen on issue

2/25/2004 - Advisory updated based on vendor response

3/02/2004 - Final advisory released

Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close