Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:19146
HistoryFeb 16, 2008 - 12:00 a.m.

[INFIGO-2008-02-13]: SOPHOS Email Security Appliance Cross Site Scripting Vulnerability

2008-02-1600:00:00
vulners.com
19
        INFIGO IS Security Advisory #ADV-2008-02-13
                            http://www.infigo.hr/en/

Title: SOPHOS Email Security Appliance Cross Site Scripting Vulnerability
Advisory ID: INFIGO-2008-02-13
Date: 2008-02-13
Advisory URL: http://www.infigo.hr/en/in_focus/advisories/INFIGO-2008-02-13
Impact: Malicious JavaScript Code Injection
Risk Level: Medium
Vulnerability Type: Remote

==[ Overview

Sophos ES1000 Email Security Appliance delivers protection against spam,
viruses, Trojans, spyware and other malware. Sophos's award-winning
anti-virus engine detects all types of malware in a single, high-speed
scan. Every Sophos appliance is updated with new protection intelligence
every 5 minutes.

==[ Vulnerability

During an audit of Sophos ES1000 Email Security Appliance, a Cross Site
Scripting vulnerability was discovered in its web administration interface.
Administration web interface is available on the public network interface,
over HTTPS on port 18080.

Lack of input validation for 'error' and 'go' parameters of the 'Login'
script, allows malicious JavaScript code injection.

https://192.168.0.10:18080/Login?logout=0&error=<INJECTION>&go=<INJECTION>

This can be exploited by a malicious user to steal Sophos ES1000 Email
Security Appliance administrator credentials, and shut down the appliance,
or change its configuration.

==[ Affected Version

The vulnerability has been identified in the latest available Sophos
ES1000 and ES4000 Email Security appliances.

==[ Fix

This vulnerability has been fixed in Sophos Email Appliance version 2.1.1.0
and above, available automatically to Sophos' customers between 14-21
February 2008. More information at
http://www.sophos.com/support/knowledgebase/article/34733.html

==[ PoC Exploit

Not needed.

==[ Vendor status

28.01.2008 - Initial contact, automated response
04.02.2008 - Repeated contact
06.02.2008 - Vendor response
07.02.2008 - Vendor status update
08.02.2008 - Vendor status update
13.02.2008 - Vendor status update
14.02.2008 - fix available
15.02.2008 - Coordinated public disclosure

==[ Credits

Vulnerability discovered by Leon Juranic <[email protected]>.

==[ INFIGO IS Security Contact

INFIGO IS,

WWW : http://www.infigo.hr/en/
E-mail : [email protected]