# Author: Madhu Akula
# Vendor Homepage: http://www.ocsinventory-ng.org
# Software Link: http://www.ocsinventory-ng.org
# Tested on: Chrome, Mozilla
Reporter Name : Madhu Akula
Product : OCS-Inventory NG
Version : All Versions
Modules : OCS Reports Web Interface
Tested On : Windows, Linux, Mac
Browsers : Firefox, Chrome, IE and all other also
Priority : High
Severity: Critical
Status : New
Summary : Multiple Stored Cross Site Scripting Vulnerabilities leads to
take over the User accounts & Internal Network scanning and some
advanced attacks
Description :
About Vulnerability :
Stored attacks are those where the injected script is permanently stored
on the target servers, such as in a database, in a message forum,
visitor log, comment field, etc. The victim then retrieves the malicious
script from the server when it requests the stored information.
Impact :
Attackers can execute scripts in a victim’s browser to hijack user
sessions, deface web sites, insert hostile content, redirect users,
hijack the user’s browser using malware, etc.
For more reference :
https://www.owasp.org/index.ph
Conclusion :
By using this vulnerability attackers use some frame works like Beef,
OWASP xenotix to exploit the victim browsers and he can able to install
key loggers and some other malicious activities also and it's very high
sever and affected to all fields and versions.
Steps to Reproduce : (POC)
I created a clear poc and the link is here,
https://www.dropbox.com/s/7bbd
Mitigation :
Fixed release in SVN
References :
http://packetstormsecurity.com
http://cxsecurity.com/issue/WL
http://www.securityfocus.com/b
http://irist.ir/exploits-1663.
Credit :
Madhu Akula
Information Security Researcher
https://www.twitter.com/madhua
Komentarų nėra:
Rašyti komentarą